A company needs to enforce USB device policy. What should you enable in Symantec Endpoint Protection?
AApplication Control
BDevice Control
CMalware Protection
DSystem Lockdown
Explanation
Device Control allows management of USB access.
Q102
What happens when an endpoint's definition updates fail?
AEndpoint becomes infected immediately
BPrevious definitions remain active
CManual definition update required
DPolicies are automatically disabled
Explanation
Existing definitions remain effective until updated.
Q103
Which service ensures antivirus definitions are up-to-date in Symantec Endpoint Security?
ALiveUpdate
BSystem Restore
CTask Scheduler
DMessage Queuing
Explanation
LiveUpdate is designed for retrieving and updating antivirus definitions, unlike the other options.
Q104
A company needs to allow employees to browse the internet safely while protecting against threats. Which feature should be enabled?
AIntrusion Prevention System
BWeb Filtering
CEmail Protection
DData Loss Prevention
Explanation
Web Filtering blocks malicious sites, while others are less focused on browsing safety.
Q105
You are configuring endpoint security policies. What happens when you set a policy to 'Quarantine' for detected threats?
AThreat is permanently deleted
BThreat is isolated from the system
CUser can still access the threat
DThreat is moved to backup
Explanation
Quarantine isolates detected threats, while A, C, and D do not reflect quarantine functionality.
Q106
Which service primarily handles endpoint threat detection?
ARisk Assessment Engine
BThreat Simulation Service
CEndpoint Protection Service
DMalware Analysis Tool
Explanation
The Endpoint Protection Service is specifically designed for threat detection across endpoints, while the others serve different functions.
Q107
A company needs to configure a policy for mobile devices using Symantec Endpoint Security. What should they prioritize?
ADevice Encryption
BWeb Filtering
CEmail Security
DNetwork Traffic Monitoring
Explanation
Device Encryption is critical for protecting data on mobile devices, unlike the other options that are less crucial for mobile devices.
Q108
What happens when a user mistakenly downloads a file flagged by Symantec as malicious?
AFile is deleted immediately
BUser receives a warning
CFile is quarantined
DNo action taken
Explanation
When a malicious file is detected, it is quarantined to prevent harm, while the other options do not align with standard security protocols.
Q109
Which service does Symantec Endpoint Security use for centralized management?
ASymantec Management Server
BNorton OS Manager
CCloud Control Center
DSymantec Incident Manager
Explanation
Symantec Management Server handles centralized configuration and management; the other options do not exist or serve different purposes.
Q110
A company needs to ensure that its sensitive data is not transferred outside its network. What should be enabled in Symantec Endpoint Security?
ADevice Control
BMalware Protection
CApplication Control
DEndpoint Security Reporting
Explanation
Device Control can prevent unauthorized devices and data transfer; other options do not specifically control data exfiltration.