VMware
Symantec Endpoint Security Complete Admin R4 Technical Specialist
250-614
Get certified with the 250-614 exam focusing on Endpoint Security Complete.
192 questions
0 views
Free
Questions 141–150 of 192
You are configuring a policy for managed devices. What happens when you disable real-time protection?
-
A
Endpoints are completely unprotected
-
B
Malware can execute undetected
-
C
Only manual scans are available
-
D
Threats are still monitored
Explanation
Disabling real-time protection allows malware to run without detection; other options misrepresent the situation.
Which service in Symantec Endpoint Security manages device control policies?
-
A
Device Control Service
-
B
Firewall Service
-
C
Web Protection Service
-
D
Antivirus Service
Explanation
The Device Control Service manages device control policies, while the others focus on different security aspects.
A company needs to ensure that its endpoints are not vulnerable to data breaches caused by removable media. What feature should they enable?
-
A
Intrusion Prevention
-
B
Application Control
-
C
Removable Media Control
-
D
Web Filtering
Explanation
Removable Media Control protects against breaches related to removable media, unlike the other options.
You are configuring endpoint protection policies and need to allow critical application updates only during work hours. What should you select?
-
A
Block All Updates After Hours
-
B
Schedule Updates during Off Hours
-
C
Allow Updates During Idle Periods
-
D
Allow Critical Updates Only
Explanation
Allowing critical updates ensures important patches are applied promptly, unlike the other options which don't focus on critical updates.
Which service in Symantec Endpoint Security provides advanced threat protection from malware?
-
A
Malware Insight
-
B
File Integrity Monitoring
-
C
Security Analytics
-
D
Device Control
Explanation
Malware Insight analyzes files for malware threats; others do not specifically target malware.
A company needs to create a policy preventing USB device usage during work hours. Which feature should they configure?
-
A
Application Control
-
B
Device Control
-
C
Network Protection
-
D
Data Loss Prevention
Explanation
Device Control specifically restricts USB and external devices; other options don't address USB usage.
What happens when a quarantined file is restored in Endpoint Security?
-
A
The file is permanently deleted.
-
B
The file is released for use.
-
C
The file is scanned again.
-
D
The user will be notified to delete.
Explanation
Restoring a quarantined file releases it back for use; others misrepresent the restoration process.
Which service in Symantec Endpoint Protection (SEP) is responsible for defining policies?
-
A
Policy Configuration Service
-
B
Security Management Console
-
C
Advanced Threat Protection
-
D
Host Integrity Service
Explanation
The Security Management Console allows for policy definition, while others serve different functions.
A company needs to prevent users from executing unauthorized software. Which feature should they utilize?
-
A
Application Control
-
B
Network Access Control
-
C
Device Control
-
D
Web Control
Explanation
Application Control specifically restricts unauthorized software execution, while others do not focus solely on applications.
What happens when a computer is in Offline mode in SEP?
-
A
All security features are disabled
-
B
It applies last known policies only
-
C
Real-time threat detection is enabled
-
D
Updates are downloaded automatically
Explanation
In Offline mode, SEP applies the last known policies but does not disable security features.