VMware
Symantec Endpoint Security Complete Admin R4 Technical Specialist
250-614
Get certified with the 250-614 exam focusing on Endpoint Security Complete.
192 questions
0 views
Free
Questions 171–180 of 192
You are configuring an exclusion policy in Symantec Endpoint Security. What happens when a file is excluded from scanning?
-
A
It will not be scanned
-
B
It will be quarantined
-
C
It will be monitored
-
D
It will be automatically deleted
Explanation
Excluding a file means it bypasses the scanning process, making it unmonitored.
Which service is responsible for threat intelligence in Symantec Endpoint Security?
-
A
Global Intelligence Network
-
B
Endpoint Protection Cloud
-
C
Managed Security Service
-
D
Incident Response Service
Explanation
The Global Intelligence Network collects threat data globally; others provide different services.
A company needs to implement a feature that allows users to run applications inside a secure container. What should they use?
-
A
Application Isolation
-
B
Endpoint Protection
-
C
Data Loss Prevention
-
D
Full Disk Encryption
Explanation
Application Isolation ensures safe execution; others do not specifically isolate applications.
You are configuring user roles in Symantec Endpoint Security. If you assign 'Observer' role, what access do they have?
-
A
Full administrative access
-
B
Can create and edit policies
-
C
Can view reports only
-
D
Can manage devices
Explanation
'Observer' role is limited to viewing reports; other options imply more extensive privileges.
Which service is responsible for enabling machine learning in Symantec Endpoint Security?
-
A
Intelligent Threat Cloud
-
B
Policy Management
-
C
Endpoint Protection
-
D
Network Monitoring
Explanation
Intelligent Threat Cloud provides machine learning capabilities; others do not focus on ML.
A company needs to deploy Symantec Endpoint Security on 100 PCs. What is the best practice for licensing?
-
A
One license per PC
-
B
Five licenses for all PCs
-
C
Unlimited licenses required
-
D
Licensing isn't necessary for deployment
Explanation
Each PC requires its own license; joint licensing options do not apply.
You are configuring user roles in Symantec Endpoint Security. What happens when a user is assigned the 'Read-Only' role?
-
A
User can modify settings
-
B
User can view data only
-
C
User can delete incidents
-
D
User can create new policies
Explanation
'Read-Only' allows viewing but no modifications; other options grant actions not permitted.
Which service in Symantec Endpoint Security provides real-time protection against threats?
-
A
Antivirus Service
-
B
Firewall Service
-
C
Backup Service
-
D
Performance Service
Explanation
The Antivirus Service offers real-time threat protection, while the others serve different functions.
A company needs to restrict unauthorized devices connecting to their network. What should they implement?
-
A
Device Control
-
B
Web Filtering
-
C
Email Protection
-
D
Application Control
Explanation
Device Control specifically manages and restricts devices, whereas the others focus on different security areas.
What happens when a quarantined file is restored in Symantec Endpoint Security?
-
A
It is immediately deleted
-
B
It is scanned before restoration
-
C
It is ignored and kept quarantined
-
D
It is automatically Whitelisted
Explanation
Restoration involves scanning to ensure safety, while the others do not accurately describe the restoration process.