VMware

Symantec Endpoint Security Complete Admin R4 Technical Specialist

250-614

Get certified with the 250-614 exam focusing on Endpoint Security Complete.

192 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 131–140 of 192

Q131

A company needs to ensure that USB devices cannot be used on user machines. Which feature in Symantec Endpoint Security should they implement?

  • A Device Control
  • B Intrusion Prevention
  • C Firewall Protection
  • D Application Layer Filtering
Explanation Device Control specifically manages access to USB devices; other options do not restrict hardware access.
Q132

What happens when a file is detected as malware but isn't quarantined due to policy settings?

  • A It is deleted immediately.
  • B It is allowed to execute.
  • C It is reported to the dashboard.
  • D It is encrypted for security.
Explanation If not quarantined, it runs normally, while deletion or encryption do not occur, and reporting happens only later.
Q133

Which service does Symantec Endpoint Security most rely on for real-time threat intelligence?

  • A Global Intelligence Network
  • B Endpoint Protection Cloud
  • C Network Access Control
  • D Data Loss Prevention
Explanation The Global Intelligence Network provides real-time threat data, while other options serve different purposes.
Q134

A company needs to identify unauthorized USB device usage. Which feature should they enable?

  • A Device Control
  • B Application Control
  • C Cloud Backup
  • D Web Security
Explanation Device Control specifically monitors and manages USB device usage.
Q135

What happens when a Symantec Endpoint client cannot communicate with the management server for 24 hours?

  • A It will shut down immediately
  • B It will revert to legacy settings
  • C It enters silent mode
  • D It continues to enforce existing policies
Explanation The client maintains its existing settings and policies despite communication loss.
Q136

Which service in Symantec Endpoint Protection monitors for suspicious activities?

  • A Intrusion Prevention System
  • B Firewall Management
  • C Data Loss Prevention
  • D Threat Intelligence Feed
Explanation The Intrusion Prevention System actively monitors and blocks suspicious activities, while the others serve different functions.
Q137

A company needs to ensure compliance with GDPR. What Symantec feature should they enable?

  • A Application Control
  • B Endpoint Detection and Response
  • C Data Loss Prevention
  • D Web Security
Explanation Data Loss Prevention is essential for protecting sensitive data and ensuring compliance, unlike the other options.
Q138

You are configuring policy settings. What happens when a client policy fails to apply?

  • A Client automatically reverts to defaults
  • B Policy application is skipped entirely
  • C Client stops any security checks
  • D Policy enforcement may still occur
Explanation Even if a policy fails to apply wholly, existing policies may still enforce rules, while the other options misrepresent client behavior.
Q139

Which service is primarily responsible for managing endpoint security policies in Symantec Endpoint Security Complete?

  • A Policy Management Service
  • B Threat Analysis Service
  • C Network Protection Service
  • D Vulnerability Manager Service
Explanation Policy Management Service handles security policies; others focus on separate functions.
Q140

A company needs to secure its endpoints against ransomware attacks. What feature should they enable?

  • A Device Control
  • B Web Security
  • C Intrusion Prevention
  • D Behavioral Monitoring
Explanation Behavioral Monitoring detects and responds to outputs typical of ransomware, unlike the others.