VMware
Symantec Endpoint Protection 14.x Admin R2 Technical Specialist
250-605
Validate your skills in endpoint protection with the 250-605 exam.
198 questions
0 views
Free
Questions 41–50 of 198
You are configuring policies in Symantec Endpoint Protection. What is the purpose of the 'Application Control' feature?
-
A
Block unwanted software execution.
-
B
Enable device encryption.
-
C
Limit user internet access.
-
D
Schedule system scans.
Explanation
'Application Control' primarily restricts execution of unauthorized applications; others describe different features.
A company needs to deploy Symantec Endpoint Protection across multiple sites. Which deployment method is best for a centralized management experience?
-
A
Stand-alone installations.
-
B
Management Server with clients.
-
C
Local servers per site.
-
D
Individual firewalls for each site.
Explanation
A Management Server provides centralized control and policies, while the other options lack centralized management capability.
Which service is primarily responsible for managing client communication in Symantec Endpoint Protection?
-
A
Symantec Endpoint Protection Manager
-
B
Client Services
-
C
Firewall Service
-
D
Intrusion Prevention Service
Explanation
The Symantec Endpoint Protection Manager manages client communication, while the others serve different security functions.
A company needs to configure a new group for a specific department in Symantec Endpoint Protection. What is the first step?
-
A
Create a Client Policy
-
B
Configure Group Policy Settings
-
C
Add Clients to a Group
-
D
Create a New Group
Explanation
Creating a New Group is the first step; the others follow after the group is established.
What happens when a client machine goes offline and the policy update is revoked?
-
A
Client retains last policy update
-
B
Client automatically updates on reconnect
-
C
Client is deleted from the system
-
D
Client becomes vulnerable to attacks
Explanation
The client retains the last policy update until it can reconnect; the other options inaccurately describe the client's behavior.
Which service is primarily responsible for real-time threat detection in Symantec Endpoint Protection?
-
A
Traffic Management Service
-
B
Real-Time Protection Service
-
C
Behavioral Protection Service
-
D
Antivirus Scheduler Service
Explanation
Real-Time Protection Service detects threats actively, while others serve different functions.
A company requires application control but needs to allow automatic updates of whitelisted applications. Which action should they take?
-
A
Block all software updates
-
B
Enable application control exceptions
-
C
Uninstall application control entirely
-
D
Disable all monitoring features
Explanation
Application control exceptions allow specified applications to bypass restrictions.
What happens when you configure a Symantec Endpoint Protection client to use a proxy server without correct credentials?
-
A
Access is granted automatically
-
B
Updates fail to download
-
C
Performance improves significantly
-
D
All local policies are ignored
Explanation
Incorrect proxy credentials prevent successful updates from being downloaded.
Which service is responsible for handling malware notifications in Symantec Endpoint Protection?
-
A
Notification Server
-
B
Event Manager
-
C
Malware Protection Service
-
D
Message Queue Service
Explanation
The Malware Protection Service manages malware notifications; others manage events or messages.
A company needs to minimize the impact of potential security incidents; what can they implement to achieve this in Symantec Endpoint Protection?
-
A
Full Disk Encryption
-
B
Intrusion Prevention System
-
C
Data Loss Prevention
-
D
Backup Solution
Explanation
An Intrusion Prevention System actively blocks incidents, while the others protect data or maintain backups.