VMware

Symantec Endpoint Security Complete Admin R4 Technical Specialist

250-614

Get certified with the 250-614 exam focusing on Endpoint Security Complete.

192 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 141–150 of 192

Q141

You are configuring a policy for managed devices. What happens when you disable real-time protection?

  • A Endpoints are completely unprotected
  • B Malware can execute undetected
  • C Only manual scans are available
  • D Threats are still monitored
Explanation Disabling real-time protection allows malware to run without detection; other options misrepresent the situation.
Q142

Which service in Symantec Endpoint Security manages device control policies?

  • A Device Control Service
  • B Firewall Service
  • C Web Protection Service
  • D Antivirus Service
Explanation The Device Control Service manages device control policies, while the others focus on different security aspects.
Q143

A company needs to ensure that its endpoints are not vulnerable to data breaches caused by removable media. What feature should they enable?

  • A Intrusion Prevention
  • B Application Control
  • C Removable Media Control
  • D Web Filtering
Explanation Removable Media Control protects against breaches related to removable media, unlike the other options.
Q144

You are configuring endpoint protection policies and need to allow critical application updates only during work hours. What should you select?

  • A Block All Updates After Hours
  • B Schedule Updates during Off Hours
  • C Allow Updates During Idle Periods
  • D Allow Critical Updates Only
Explanation Allowing critical updates ensures important patches are applied promptly, unlike the other options which don't focus on critical updates.
Q145

Which service in Symantec Endpoint Security provides advanced threat protection from malware?

  • A Malware Insight
  • B File Integrity Monitoring
  • C Security Analytics
  • D Device Control
Explanation Malware Insight analyzes files for malware threats; others do not specifically target malware.
Q146

A company needs to create a policy preventing USB device usage during work hours. Which feature should they configure?

  • A Application Control
  • B Device Control
  • C Network Protection
  • D Data Loss Prevention
Explanation Device Control specifically restricts USB and external devices; other options don't address USB usage.
Q147

What happens when a quarantined file is restored in Endpoint Security?

  • A The file is permanently deleted.
  • B The file is released for use.
  • C The file is scanned again.
  • D The user will be notified to delete.
Explanation Restoring a quarantined file releases it back for use; others misrepresent the restoration process.
Q148

Which service in Symantec Endpoint Protection (SEP) is responsible for defining policies?

  • A Policy Configuration Service
  • B Security Management Console
  • C Advanced Threat Protection
  • D Host Integrity Service
Explanation The Security Management Console allows for policy definition, while others serve different functions.
Q149

A company needs to prevent users from executing unauthorized software. Which feature should they utilize?

  • A Application Control
  • B Network Access Control
  • C Device Control
  • D Web Control
Explanation Application Control specifically restricts unauthorized software execution, while others do not focus solely on applications.
Q150

What happens when a computer is in Offline mode in SEP?

  • A All security features are disabled
  • B It applies last known policies only
  • C Real-time threat detection is enabled
  • D Updates are downloaded automatically
Explanation In Offline mode, SEP applies the last known policies but does not disable security features.