VMware

Symantec Endpoint Protection 14.x Admin R2 Technical Specialist

250-605

Validate your skills in endpoint protection with the 250-605 exam.

198 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 51–60 of 198

Q51

You are configuring a client policy in Symantec Endpoint Protection; which setting must be included to ensure inappropriate website access is restricted?

  • A Host Integrity Check
  • B Web Traffic Filtering
  • C LiveUpdate Configuration
  • D Application Control
Explanation Web Traffic Filtering directly controls access to websites; others pertain to different functionalities.
Q52

Which service does Symantec Endpoint Protection use for centralized management?

  • A Symantec Endpoint Protection Manager
  • B Symantec Antivirus Client
  • C Symantec Network Threat Protection
  • D Symantec LiveUpdate
Explanation Symantec Endpoint Protection Manager is essential for centralized management, while others serve different functions.
Q53

A company needs to block unauthorized USB devices. What should you configure in Symantec Endpoint Protection?

  • A Firewall rules setup
  • B Application and Device Control
  • C Intrusion Prevention rules
  • D Web filtering settings
Explanation Application and Device Control specifically addresses device usage, while others are for different security tasks.
Q54

What happens when a client detects a threat in a non-default action mode?

  • A It moves the threat to quarantine
  • B It automatically deletes the threat
  • C It prompts user interaction
  • D It ignores the threat
Explanation In non-default modes, user interaction is required, unlike automatic actions in default modes.
Q55

A company needs to configure the firewall settings in Symantec Endpoint Protection. Which type of rule should they create first?

  • A Global Blocking Rule
  • B Permit All Traffic Rule
  • C Custom Security Policy Rule
  • D Scheduled Maintenance Rule
Explanation The Custom Security Policy Rule allows tailored firewall settings, while others do not address specific configurations uniquely required by the organization.
Q56

What happens when a user's device is quarantined in Symantec Endpoint Protection?

  • A Device can still access the network.
  • B Threat is permanently deleted.
  • C Malware is disabled but files remain.
  • D Network access is completely blocked.
Explanation When a device is quarantined, it is blocked from network access to prevent spreading threats.
Q57

You are configuring a client policy. Which option restricts the execution of applications only if they are not digitally signed?

  • A Application Whitelisting
  • B Block Unsigned Applications
  • C Restrict Digital Certificates
  • D Limit Application Control Policies
Explanation Block Unsigned Applications specifically restricts executions based on digital signatures.
Q58

Which service is responsible for managing client communications in Symantec Endpoint Protection?

  • A Symantec Endpoint Protection Manager
  • B Symantec LiveUpdate
  • C Symantec Network Access Control
  • D Symantec Threat and Risk Assessment
Explanation The Symantec Endpoint Protection Manager manages all client communications and policies, while others serve different functions.
Q59

A company needs to implement a firewall policy. Which type of policy should be created to prevent unauthorized network access?

  • A Host Integrity Policy
  • B Traffic Policy
  • C Firewall Policy
  • D Malware Protection Policy
Explanation A Firewall Policy specifically controls access to network resources based on defined rules.
Q60

You are configuring a new client's threat response. What happens when a detected threat is classified as 'low risk'?

  • A Immediate quarantine of the file
  • B User notification only
  • C No action taken
  • D Full system scan initiated
Explanation Low-risk threats typically result in no action taken, in contrast to higher-risk threats.