What happens when a user attempts to access a known malicious URL while using Symantec Endpoint Security?
ATraffic is allowed without checks
BUser gets redirected to a safe page
CDownload is initiated without alert
DAccess is blocked by the web protection feature
Explanation
Symantec's web protection feature blocks access to known malicious URLs to ensure security, while other options describe incorrect behaviors.
Q112
Which service in Symantec Endpoint Security provides real-time threat intelligence updates?
ANorton Insight
BLiveUpdate
CThreat Analyzer
DSysLog Client
Explanation
LiveUpdate delivers real-time updates for security definitions, while others serve different functions.
Q113
A company needs to deploy a firewall rule that blocks certain IP addresses from accessing its network. Which feature would support this requirement in Symantec Endpoint Security?
AHosted Anti-Malware
BNetwork Threat Protection
CApplication Control
DDevice Control
Explanation
Network Threat Protection allows for IP filtering, while other features focus on different protective measures.
Q114
You are configuring your endpoint encryption policy and need to change the encryption algorithm. What happens if you choose a less secure algorithm?
AEncryption will strengthen
BSecurity compliance will be unaffected
CData becomes more instantly accessible
DSystem performance significantly improves
Explanation
Choosing a less secure algorithm exposes data to potential risks, while other options present misleading effects.
Q115
Which service is primarily responsible for threat detection in Symantec Endpoint Security Complete?
ASonar Technology
BWeb Protection
CEmail Security
DDevice Control
Explanation
Sonar Technology uses heuristics for proactive threat detection; others focus on specific vectors.
Q116
A company needs to ensure that no unauthorized devices connect to its network. What should the administrator configure?
ANetwork Access Control
BHost Firewall
CContent Filtering
DData Loss Prevention
Explanation
Network Access Control prevents unauthorized devices; others serve different security purposes.
Q117
You are configuring the Symantec Endpoint Security policies. What happens when you set the 'Quarantine' action for threats?
AThreats are deleted immediately
BThreats are isolated for analysis
CThreats are ignored
DThreats are reported only
Explanation
'Quarantine' isolates threats for safe review; other options misrepresent the action's function.
Q118
Which service is responsible for real-time malware protection?
AAntivirus Service
BFirewall Service
CIntrusion Prevention Service
DEndpoint Detection Service
Explanation
The Antivirus Service monitors and protects against malware, while others focus on different security aspects.
Q119
A company needs to prevent data leaks. What configuration is most effective for this?
ADisable encryption on all devices
BImplement Data Loss Prevention policies
CIncrease user access rights
DUse basic antivirus software only
Explanation
Data Loss Prevention policies directly target data leak prevention, while other options could worsen security.
Q120
You are configuring a Symantec Endpoint Security policy. What should you consider for legacy systems?
AApply newer policies without checks
BEnsure compatibility with older versions
CIgnore legacy systems during policy rollout
DUse only hardware solutions
Explanation
Compatibility is critical to ensure legacy systems can operate without issues, while others could cause system failures.