VMware
Symantec Endpoint Security Complete Admin R4 Technical Specialist
250-614
Get certified with the 250-614 exam focusing on Endpoint Security Complete.
192 questions
0 views
Free
Questions 151–160 of 192
Which service allows for real-time threat prevention in Symantec Endpoint Security?
-
A
Advanced Threat Protection
-
B
Data Loss Prevention
-
C
Network Security Monitoring
-
D
Email Filtering
Explanation
Advanced Threat Protection provides proactive defense against threats, while the other options serve different security functions.
A company needs to restrict specific applications on employee workstations. Which feature in Symantec Endpoint Security should they use?
-
A
Device Control
-
B
Application Control
-
C
Firewall Rules
-
D
Web Filtering
Explanation
Application Control specifically addresses application restrictions, unlike the other features which focus on different areas of security.
You are configuring client policies for remote employees. What happens when a client is offline for an extended period?
-
A
Policies are deleted automatically
-
B
Policies remain cached
-
C
Clients turn off automatically
-
D
No policies apply until online
Explanation
Policies remain cached on the client until it reconnects, while other options incorrectly describe the behavior of offline clients.
Which service is responsible for real-time malware detection in Symantec Endpoint Security Complete?
-
A
File System Monitoring
-
B
Network Threat Protection
-
C
Behavioral Analysis
-
D
Email Filtering
Explanation
Behavioral Analysis examines processes in real-time for malicious actions; others describe different protection features.
A company needs to enforce encryption on all employee laptops. Which policy setting should be configured?
-
A
Firewall Policy
-
B
Encryption Policy
-
C
Content Filtering Policy
-
D
Device Control Policy
Explanation
Encryption Policy specifically addresses data encryption; others focus on different security aspects.
What happens when an untrusted application runs on a desktop protected by Symantec Endpoint Security?
-
A
It is automatically deleted.
-
B
User is notified upon execution.
-
C
Its network access is restricted.
-
D
It is quarantined based on policy.
Explanation
Applications deemed untrusted are typically quarantined to prevent harm, while others do not occur under standard conditions.
Which service is key for implementing threat detection in Symantec Endpoint Security?
-
A
LiveUpdate Service
-
B
Event Management Service
-
C
Intelligence Service
-
D
Database Service
Explanation
The Intelligence Service analyzes threat data for detection, while others support various functions.
A company needs to restrict USB device usage on endpoints. Which feature should they configure?
-
A
Application Control
-
B
Device Control
-
C
Network Control
-
D
Content Control
Explanation
Device Control allows management of USB device access, unlike others that focus on applications or network security.
What happens when a previously quarantined file is restored in Symantec Endpoint Security?
-
A
It is permanently deleted.
-
B
It is automatically re-scanned.
-
C
It remains in quarantine.
-
D
It is ignored by all scans.
Explanation
Restoration triggers a re-scan to ensure safety before the file is accessed again.
Which service should be enabled to ensure real-time protection against malware?
-
A
Endpoint Protection Service
-
B
Backup Service
-
C
Data Encryption Service
-
D
Network Monitoring Service
Explanation
The Endpoint Protection Service provides real-time malware scanning, while others do not relate to malware protection.