VMware

Symantec Endpoint Security Complete Admin R4 Technical Specialist

250-614

Get certified with the 250-614 exam focusing on Endpoint Security Complete.

192 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 151–160 of 192

Q151

Which service allows for real-time threat prevention in Symantec Endpoint Security?

  • A Advanced Threat Protection
  • B Data Loss Prevention
  • C Network Security Monitoring
  • D Email Filtering
Explanation Advanced Threat Protection provides proactive defense against threats, while the other options serve different security functions.
Q152

A company needs to restrict specific applications on employee workstations. Which feature in Symantec Endpoint Security should they use?

  • A Device Control
  • B Application Control
  • C Firewall Rules
  • D Web Filtering
Explanation Application Control specifically addresses application restrictions, unlike the other features which focus on different areas of security.
Q153

You are configuring client policies for remote employees. What happens when a client is offline for an extended period?

  • A Policies are deleted automatically
  • B Policies remain cached
  • C Clients turn off automatically
  • D No policies apply until online
Explanation Policies remain cached on the client until it reconnects, while other options incorrectly describe the behavior of offline clients.
Q154

Which service is responsible for real-time malware detection in Symantec Endpoint Security Complete?

  • A File System Monitoring
  • B Network Threat Protection
  • C Behavioral Analysis
  • D Email Filtering
Explanation Behavioral Analysis examines processes in real-time for malicious actions; others describe different protection features.
Q155

A company needs to enforce encryption on all employee laptops. Which policy setting should be configured?

  • A Firewall Policy
  • B Encryption Policy
  • C Content Filtering Policy
  • D Device Control Policy
Explanation Encryption Policy specifically addresses data encryption; others focus on different security aspects.
Q156

What happens when an untrusted application runs on a desktop protected by Symantec Endpoint Security?

  • A It is automatically deleted.
  • B User is notified upon execution.
  • C Its network access is restricted.
  • D It is quarantined based on policy.
Explanation Applications deemed untrusted are typically quarantined to prevent harm, while others do not occur under standard conditions.
Q157

Which service is key for implementing threat detection in Symantec Endpoint Security?

  • A LiveUpdate Service
  • B Event Management Service
  • C Intelligence Service
  • D Database Service
Explanation The Intelligence Service analyzes threat data for detection, while others support various functions.
Q158

A company needs to restrict USB device usage on endpoints. Which feature should they configure?

  • A Application Control
  • B Device Control
  • C Network Control
  • D Content Control
Explanation Device Control allows management of USB device access, unlike others that focus on applications or network security.
Q159

What happens when a previously quarantined file is restored in Symantec Endpoint Security?

  • A It is permanently deleted.
  • B It is automatically re-scanned.
  • C It remains in quarantine.
  • D It is ignored by all scans.
Explanation Restoration triggers a re-scan to ensure safety before the file is accessed again.
Q160

Which service should be enabled to ensure real-time protection against malware?

  • A Endpoint Protection Service
  • B Backup Service
  • C Data Encryption Service
  • D Network Monitoring Service
Explanation The Endpoint Protection Service provides real-time malware scanning, while others do not relate to malware protection.