VMware
Symantec Endpoint Security Complete Admin R4 Technical Specialist
250-614
Get certified with the 250-614 exam focusing on Endpoint Security Complete.
192 questions
0 views
Free
Questions 131–140 of 192
A company needs to ensure that USB devices cannot be used on user machines. Which feature in Symantec Endpoint Security should they implement?
-
A
Device Control
-
B
Intrusion Prevention
-
C
Firewall Protection
-
D
Application Layer Filtering
Explanation
Device Control specifically manages access to USB devices; other options do not restrict hardware access.
What happens when a file is detected as malware but isn't quarantined due to policy settings?
-
A
It is deleted immediately.
-
B
It is allowed to execute.
-
C
It is reported to the dashboard.
-
D
It is encrypted for security.
Explanation
If not quarantined, it runs normally, while deletion or encryption do not occur, and reporting happens only later.
Which service does Symantec Endpoint Security most rely on for real-time threat intelligence?
-
A
Global Intelligence Network
-
B
Endpoint Protection Cloud
-
C
Network Access Control
-
D
Data Loss Prevention
Explanation
The Global Intelligence Network provides real-time threat data, while other options serve different purposes.
A company needs to identify unauthorized USB device usage. Which feature should they enable?
-
A
Device Control
-
B
Application Control
-
C
Cloud Backup
-
D
Web Security
Explanation
Device Control specifically monitors and manages USB device usage.
What happens when a Symantec Endpoint client cannot communicate with the management server for 24 hours?
-
A
It will shut down immediately
-
B
It will revert to legacy settings
-
C
It enters silent mode
-
D
It continues to enforce existing policies
Explanation
The client maintains its existing settings and policies despite communication loss.
Which service in Symantec Endpoint Protection monitors for suspicious activities?
-
A
Intrusion Prevention System
-
B
Firewall Management
-
C
Data Loss Prevention
-
D
Threat Intelligence Feed
Explanation
The Intrusion Prevention System actively monitors and blocks suspicious activities, while the others serve different functions.
A company needs to ensure compliance with GDPR. What Symantec feature should they enable?
-
A
Application Control
-
B
Endpoint Detection and Response
-
C
Data Loss Prevention
-
D
Web Security
Explanation
Data Loss Prevention is essential for protecting sensitive data and ensuring compliance, unlike the other options.
You are configuring policy settings. What happens when a client policy fails to apply?
-
A
Client automatically reverts to defaults
-
B
Policy application is skipped entirely
-
C
Client stops any security checks
-
D
Policy enforcement may still occur
Explanation
Even if a policy fails to apply wholly, existing policies may still enforce rules, while the other options misrepresent client behavior.
Which service is primarily responsible for managing endpoint security policies in Symantec Endpoint Security Complete?
-
A
Policy Management Service
-
B
Threat Analysis Service
-
C
Network Protection Service
-
D
Vulnerability Manager Service
Explanation
Policy Management Service handles security policies; others focus on separate functions.
A company needs to secure its endpoints against ransomware attacks. What feature should they enable?
-
A
Device Control
-
B
Web Security
-
C
Intrusion Prevention
-
D
Behavioral Monitoring
Explanation
Behavioral Monitoring detects and responds to outputs typical of ransomware, unlike the others.