Which service does Symantec Endpoint Protection use for real-time threat protection?
ASymantec Threat Quarantine
BInsight Technology
CCloud Backup Service
DFirewall Security Management
Explanation
Insight Technology leverages file reputation for real-time protection, while the others do not provide real-time detection capabilities.
Q122
You are configuring policy settings for website filtering; what is the primary step to block specific categories?
AModify firewall rules
BDefine website categories in the policy
CEnable VPN access
DIncrease system resources
Explanation
You must define website categories in the policy to implement filtering, as firewall rules affect traffic without categorization.
Q123
What happens when a client machine status changes to 'Offline' in Symantec Endpoint Protection?
AAll protection features are disabled
BUpdates are queued until online
CRemote commands are executed immediately
DAlerts are sent to users
Explanation
When a client is offline, updates are queued for when the connection resumes, while other options misrepresent the client's status.
Q124
Which service provides threat intelligence updates for Symantec Endpoint Security?
AAdvanced Threat Protection
BNetwork Monitoring Service
CPolicy Enforcement Service
DWeb Security Service
Explanation
Advanced Threat Protection delivers real-time threat intelligence, while others do not specialize in this area.
Q125
A company needs to prevent malware from using external drives. What configuration should be applied?
ADisable USB ports altogether
BEnable Drive Encryption
CRestrict USB drive access
DInstall updates regularly
Explanation
Restricting USB drive access prevents malware execution while other options either restrict broader functionality or do not address the issue directly.
Q126
What happens when a Symantec Endpoint client reports a false positive incident?
AEnd user is immediately blocked
BThreat is permanently removed
CThreat is submitted for review
DClient is uninstalled instantly
Explanation
The incident is submitted for review to evaluate the legitimacy of the threat, while the others include actions that are not correct protocols.
Q127
Which service does Symantec Endpoint Security use for real-time threat intelligence?
AGlobal Intelligence Network
BIncident Response Team
CLocal Threat Database
DUser Behavior Analytics
Explanation
The Global Intelligence Network provides real-time data on threats, while the others do not focus on global threat intelligence.
Q128
A company needs to minimize downtime during updates. What configuration should they enable?
ARestart during low usage hours
BStaggered patch deployment
CManual updates only
DComplete shutdown during updates
Explanation
Staggered patch deployment allows updates per group without shutting down all systems, while the others can lead to increased downtime.
Q129
You are configuring policy exclusions. What happens when a file is excluded from scans?
AIt is deleted automatically
BIt is not scanned for malware
COnly its metadata is excluded
DIt gets quarantined immediately
Explanation
Exclusions mean the file is not subjected to malware scans, while the other options do not accurately describe what occurs.
Q130
Which service in Symantec Endpoint Security helps block unauthorized changes to system settings?
AApplication Control
BHost Integrity
CWeb Security
DEmail Security
Explanation
Application Control prevents unauthorized changes, while the others focus on different security aspects.