VMware

Symantec Endpoint Security Complete Admin R4 Technical Specialist

250-614

Get certified with the 250-614 exam focusing on Endpoint Security Complete.

192 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 91–100 of 192

Q91

Which service allows for real-time threat detection in Symantec Endpoint Security Complete?

  • A Cloud Threat Intelligence
  • B On-Premises File Scanning
  • C Application Control
  • D Network Access Control
Explanation Cloud Threat Intelligence leverages real-time data for threat detection, whereas the others focus on different security functions.
Q92

A company needs to isolate a computer that is suspected of containing malware. What feature of Symantec Endpoint Security should they use?

  • A Quarantine
  • B Active Detection
  • C Backup and Restore
  • D File Encryption
Explanation Quarantine isolates potentially harmful files, while the other options do not serve this purpose.
Q93

You are configuring a new deployment. What happens when you enable the 'Scan on Write' feature?

  • A Real-time scans on file creation
  • B Full scans every hour
  • C Immediate deletion of viruses
  • D Network scanning only
Explanation 'Scan on Write' ensures files are scanned when created or modified, unlike the other options.
Q94

Which service provides real-time antivirus protection in Symantec Endpoint Security?

  • A Antivirus and Anti-Spyware
  • B Firewall Service
  • C Intrusion Prevention
  • D Data Loss Prevention
Explanation Antivirus and Anti-Spyware service offers real-time protection, while others serve different security functions.
Q95

A company needs to ensure its endpoints receive the latest security updates. What feature should they enable?

  • A LiveUpdate
  • B Quick Scan
  • C System Restore
  • D Backup Dedupe
Explanation LiveUpdate automatically downloads and installs updates, while the others serve different purposes.
Q96

You are configuring a custom scan for specific file types. What happens when you include .exe files in the scan?

  • A They are ignored by the scan
  • B They will be scanned for threats
  • C Only non-executable files are scanned
  • D They cause the scan to fail
Explanation Including .exe files means they will be scanned for viruses and threats, ensuring comprehensive security.
Q97

Which service in Symantec Endpoint Security performs device control?

  • A Device Control Service
  • B Network Security Service
  • C Endpoint Protection Service
  • D Anti-Spyware Service
Explanation The Device Control Service specifically manages device permissions, whereas the other services focus on different aspects of endpoint security.
Q98

A company needs to ensure their endpoints are isolated during a suspected malware infection. Which feature should they enable?

  • A Application Control
  • B Isolation Mode
  • C Network Protection
  • D Threat Intelligence
Explanation Isolation Mode effectively quarantines infected systems, preventing malware spread, which is not the primary function of the other options.
Q99

What happens when you enable Progressive Threat Protection?

  • A Real-time threat blocking occurs.
  • B Static analysis of files only.
  • C No protection is provided.
  • D User behavior analytics are disabled.
Explanation Progressive Threat Protection actively blocks threats in real time, while the other options do not accurately represent its functionality.
Q100

Which service monitors real-time security events?

  • A Security Information and Event Management
  • B Network Traffic Analysis
  • C User Authentication Service
  • D Endpoint Configuration Management
Explanation SIEM is designed to analyze security events.