You are configuring a client policy in Symantec Endpoint Protection; which setting must be included to ensure inappropriate website access is restricted?
AHost Integrity Check
BWeb Traffic Filtering
CLiveUpdate Configuration
DApplication Control
Explanation
Web Traffic Filtering directly controls access to websites; others pertain to different functionalities.
Q52
Which service does Symantec Endpoint Protection use for centralized management?
ASymantec Endpoint Protection Manager
BSymantec Antivirus Client
CSymantec Network Threat Protection
DSymantec LiveUpdate
Explanation
Symantec Endpoint Protection Manager is essential for centralized management, while others serve different functions.
Q53
A company needs to block unauthorized USB devices. What should you configure in Symantec Endpoint Protection?
AFirewall rules setup
BApplication and Device Control
CIntrusion Prevention rules
DWeb filtering settings
Explanation
Application and Device Control specifically addresses device usage, while others are for different security tasks.
Q54
What happens when a client detects a threat in a non-default action mode?
AIt moves the threat to quarantine
BIt automatically deletes the threat
CIt prompts user interaction
DIt ignores the threat
Explanation
In non-default modes, user interaction is required, unlike automatic actions in default modes.
Q55
A company needs to configure the firewall settings in Symantec Endpoint Protection. Which type of rule should they create first?
AGlobal Blocking Rule
BPermit All Traffic Rule
CCustom Security Policy Rule
DScheduled Maintenance Rule
Explanation
The Custom Security Policy Rule allows tailored firewall settings, while others do not address specific configurations uniquely required by the organization.
Q56
What happens when a user's device is quarantined in Symantec Endpoint Protection?
ADevice can still access the network.
BThreat is permanently deleted.
CMalware is disabled but files remain.
DNetwork access is completely blocked.
Explanation
When a device is quarantined, it is blocked from network access to prevent spreading threats.
Q57
You are configuring a client policy. Which option restricts the execution of applications only if they are not digitally signed?
AApplication Whitelisting
BBlock Unsigned Applications
CRestrict Digital Certificates
DLimit Application Control Policies
Explanation
Block Unsigned Applications specifically restricts executions based on digital signatures.
Q58
Which service is responsible for managing client communications in Symantec Endpoint Protection?
ASymantec Endpoint Protection Manager
BSymantec LiveUpdate
CSymantec Network Access Control
DSymantec Threat and Risk Assessment
Explanation
The Symantec Endpoint Protection Manager manages all client communications and policies, while others serve different functions.
Q59
A company needs to implement a firewall policy. Which type of policy should be created to prevent unauthorized network access?
AHost Integrity Policy
BTraffic Policy
CFirewall Policy
DMalware Protection Policy
Explanation
A Firewall Policy specifically controls access to network resources based on defined rules.
Q60
You are configuring a new client's threat response. What happens when a detected threat is classified as 'low risk'?
AImmediate quarantine of the file
BUser notification only
CNo action taken
DFull system scan initiated
Explanation
Low-risk threats typically result in no action taken, in contrast to higher-risk threats.