VMware

Symantec Endpoint Security Complete Admin R4 Technical Specialist

250-614

Get certified with the 250-614 exam focusing on Endpoint Security Complete.

192 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 101–110 of 192

Q101

A company needs to enforce USB device policy. What should you enable in Symantec Endpoint Protection?

  • A Application Control
  • B Device Control
  • C Malware Protection
  • D System Lockdown
Explanation Device Control allows management of USB access.
Q102

What happens when an endpoint's definition updates fail?

  • A Endpoint becomes infected immediately
  • B Previous definitions remain active
  • C Manual definition update required
  • D Policies are automatically disabled
Explanation Existing definitions remain effective until updated.
Q103

Which service ensures antivirus definitions are up-to-date in Symantec Endpoint Security?

  • A LiveUpdate
  • B System Restore
  • C Task Scheduler
  • D Message Queuing
Explanation LiveUpdate is designed for retrieving and updating antivirus definitions, unlike the other options.
Q104

A company needs to allow employees to browse the internet safely while protecting against threats. Which feature should be enabled?

  • A Intrusion Prevention System
  • B Web Filtering
  • C Email Protection
  • D Data Loss Prevention
Explanation Web Filtering blocks malicious sites, while others are less focused on browsing safety.
Q105

You are configuring endpoint security policies. What happens when you set a policy to 'Quarantine' for detected threats?

  • A Threat is permanently deleted
  • B Threat is isolated from the system
  • C User can still access the threat
  • D Threat is moved to backup
Explanation Quarantine isolates detected threats, while A, C, and D do not reflect quarantine functionality.
Q106

Which service primarily handles endpoint threat detection?

  • A Risk Assessment Engine
  • B Threat Simulation Service
  • C Endpoint Protection Service
  • D Malware Analysis Tool
Explanation The Endpoint Protection Service is specifically designed for threat detection across endpoints, while the others serve different functions.
Q107

A company needs to configure a policy for mobile devices using Symantec Endpoint Security. What should they prioritize?

  • A Device Encryption
  • B Web Filtering
  • C Email Security
  • D Network Traffic Monitoring
Explanation Device Encryption is critical for protecting data on mobile devices, unlike the other options that are less crucial for mobile devices.
Q108

What happens when a user mistakenly downloads a file flagged by Symantec as malicious?

  • A File is deleted immediately
  • B User receives a warning
  • C File is quarantined
  • D No action taken
Explanation When a malicious file is detected, it is quarantined to prevent harm, while the other options do not align with standard security protocols.
Q109

Which service does Symantec Endpoint Security use for centralized management?

  • A Symantec Management Server
  • B Norton OS Manager
  • C Cloud Control Center
  • D Symantec Incident Manager
Explanation Symantec Management Server handles centralized configuration and management; the other options do not exist or serve different purposes.
Q110

A company needs to ensure that its sensitive data is not transferred outside its network. What should be enabled in Symantec Endpoint Security?

  • A Device Control
  • B Malware Protection
  • C Application Control
  • D Endpoint Security Reporting
Explanation Device Control can prevent unauthorized devices and data transfer; other options do not specifically control data exfiltration.