What happens when an end-user disables the Symantec Endpoint Protection client?
AUnauthorized applications are blocked
BAll protections remain active
CThe system is vulnerable
DRemote management stops working
Explanation
Disabling the SEP client opens the system to potential threats, while the others incorrectly state the state of protections or functionalities.
Q22
Which service is primarily responsible for providing virus definitions in Symantec Endpoint Protection 14.x?
ALiveUpdate
BAutoProtect
CClient Security Service
DSymantec Threat Intelligence
Explanation
LiveUpdate downloads updates; others serve different functions.
Q23
A company needs to ensure they can monitor endpoint activities in real-time. What feature in Symantec Endpoint Protection should they enable?
AApplied Policies
BReal-Time Protection
CScan Scheduling
DApplication Control
Explanation
Real-Time Protection actively monitors activities; others do not achieve this.
Q24
What happens when a device with Symantec Endpoint Protection encounters a possibly unwanted application during a scan?
AIt quarantines the application immediately.
BIt prompts the user for action.
CIt ignores the application completely.
DIt deletes the application automatically.
Explanation
User interaction is needed for possibly unwanted apps; the others are incorrect actions for such apps.
Q25
Which service is responsible for managing policy distribution in Symantec Endpoint Protection?
ASymantec Endpoint Protection Manager (SEPM)
BNetwork Threat Protection
CApplication and Device Control
DBrowser Protection
Explanation
The SEPM manages policy distribution, while the others are specific protection features.
Q26
A company needs to ensure that all endpoints are compliant with security policies before they connect to the network. Which feature can help achieve this?
ANetwork Access Control (NAC)
BEndpoint Protection Manager
CFirewall Rules
DLiveUpdate
Explanation
NAC checks compliance before granting access, while others do not enforce policy compliance.
Q27
You are configuring the Sonar feature in Symantec Endpoint Protection. What happens if a file is flagged as suspicious?
AFile is automatically deleted
BUser is alerted with options
CFile is ignored
DFile is encrypted
Explanation
Sonar alerts the user, allowing them to take an action, while the other options do not reflect the handling of suspicious files.
Q28
Which service in Symantec Endpoint Protection manages policies?
APolicy Server
BEndpoint Manager
CClient Service
DNetwork Monitor
Explanation
The Policy Server is responsible for managing and distributing policies across endpoints, while the other options do not serve this specific purpose.
Q29
A company needs to protect its sensitive data on mobile devices. Which Symantec feature should they implement?
AWeb Filtering
BDevice Control
CApplication Control
DEmail Security
Explanation
Device Control specifically manages access and protection for mobile devices, unlike the other features listed.
Q30
What happens when a client fails to communicate with the management server for 7 days?
AClient is uninstalled automatically
BClient remains active but unsupervised
CClient reverts to its last known state
DClient's protection features are disabled
Explanation
After 7 days of failed communication, the client disables its protection features to prevent security risks, while the other options are incorrect scenarios.