VMware

Symantec Endpoint Security Complete Admin R4 Technical Specialist

250-614

Get certified with the 250-614 exam focusing on Endpoint Security Complete.

192 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 121–130 of 192

Q121

Which service does Symantec Endpoint Protection use for real-time threat protection?

  • A Symantec Threat Quarantine
  • B Insight Technology
  • C Cloud Backup Service
  • D Firewall Security Management
Explanation Insight Technology leverages file reputation for real-time protection, while the others do not provide real-time detection capabilities.
Q122

You are configuring policy settings for website filtering; what is the primary step to block specific categories?

  • A Modify firewall rules
  • B Define website categories in the policy
  • C Enable VPN access
  • D Increase system resources
Explanation You must define website categories in the policy to implement filtering, as firewall rules affect traffic without categorization.
Q123

What happens when a client machine status changes to 'Offline' in Symantec Endpoint Protection?

  • A All protection features are disabled
  • B Updates are queued until online
  • C Remote commands are executed immediately
  • D Alerts are sent to users
Explanation When a client is offline, updates are queued for when the connection resumes, while other options misrepresent the client's status.
Q124

Which service provides threat intelligence updates for Symantec Endpoint Security?

  • A Advanced Threat Protection
  • B Network Monitoring Service
  • C Policy Enforcement Service
  • D Web Security Service
Explanation Advanced Threat Protection delivers real-time threat intelligence, while others do not specialize in this area.
Q125

A company needs to prevent malware from using external drives. What configuration should be applied?

  • A Disable USB ports altogether
  • B Enable Drive Encryption
  • C Restrict USB drive access
  • D Install updates regularly
Explanation Restricting USB drive access prevents malware execution while other options either restrict broader functionality or do not address the issue directly.
Q126

What happens when a Symantec Endpoint client reports a false positive incident?

  • A End user is immediately blocked
  • B Threat is permanently removed
  • C Threat is submitted for review
  • D Client is uninstalled instantly
Explanation The incident is submitted for review to evaluate the legitimacy of the threat, while the others include actions that are not correct protocols.
Q127

Which service does Symantec Endpoint Security use for real-time threat intelligence?

  • A Global Intelligence Network
  • B Incident Response Team
  • C Local Threat Database
  • D User Behavior Analytics
Explanation The Global Intelligence Network provides real-time data on threats, while the others do not focus on global threat intelligence.
Q128

A company needs to minimize downtime during updates. What configuration should they enable?

  • A Restart during low usage hours
  • B Staggered patch deployment
  • C Manual updates only
  • D Complete shutdown during updates
Explanation Staggered patch deployment allows updates per group without shutting down all systems, while the others can lead to increased downtime.
Q129

You are configuring policy exclusions. What happens when a file is excluded from scans?

  • A It is deleted automatically
  • B It is not scanned for malware
  • C Only its metadata is excluded
  • D It gets quarantined immediately
Explanation Exclusions mean the file is not subjected to malware scans, while the other options do not accurately describe what occurs.
Q130

Which service in Symantec Endpoint Security helps block unauthorized changes to system settings?

  • A Application Control
  • B Host Integrity
  • C Web Security
  • D Email Security
Explanation Application Control prevents unauthorized changes, while the others focus on different security aspects.