VMware

Symantec Endpoint Security Complete Admin R4 Technical Specialist

250-614

Get certified with the 250-614 exam focusing on Endpoint Security Complete.

192 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 171–180 of 192

Q171

You are configuring an exclusion policy in Symantec Endpoint Security. What happens when a file is excluded from scanning?

  • A It will not be scanned
  • B It will be quarantined
  • C It will be monitored
  • D It will be automatically deleted
Explanation Excluding a file means it bypasses the scanning process, making it unmonitored.
Q172

Which service is responsible for threat intelligence in Symantec Endpoint Security?

  • A Global Intelligence Network
  • B Endpoint Protection Cloud
  • C Managed Security Service
  • D Incident Response Service
Explanation The Global Intelligence Network collects threat data globally; others provide different services.
Q173

A company needs to implement a feature that allows users to run applications inside a secure container. What should they use?

  • A Application Isolation
  • B Endpoint Protection
  • C Data Loss Prevention
  • D Full Disk Encryption
Explanation Application Isolation ensures safe execution; others do not specifically isolate applications.
Q174

You are configuring user roles in Symantec Endpoint Security. If you assign 'Observer' role, what access do they have?

  • A Full administrative access
  • B Can create and edit policies
  • C Can view reports only
  • D Can manage devices
Explanation 'Observer' role is limited to viewing reports; other options imply more extensive privileges.
Q175

Which service is responsible for enabling machine learning in Symantec Endpoint Security?

  • A Intelligent Threat Cloud
  • B Policy Management
  • C Endpoint Protection
  • D Network Monitoring
Explanation Intelligent Threat Cloud provides machine learning capabilities; others do not focus on ML.
Q176

A company needs to deploy Symantec Endpoint Security on 100 PCs. What is the best practice for licensing?

  • A One license per PC
  • B Five licenses for all PCs
  • C Unlimited licenses required
  • D Licensing isn't necessary for deployment
Explanation Each PC requires its own license; joint licensing options do not apply.
Q177

You are configuring user roles in Symantec Endpoint Security. What happens when a user is assigned the 'Read-Only' role?

  • A User can modify settings
  • B User can view data only
  • C User can delete incidents
  • D User can create new policies
Explanation 'Read-Only' allows viewing but no modifications; other options grant actions not permitted.
Q178

Which service in Symantec Endpoint Security provides real-time protection against threats?

  • A Antivirus Service
  • B Firewall Service
  • C Backup Service
  • D Performance Service
Explanation The Antivirus Service offers real-time threat protection, while the others serve different functions.
Q179

A company needs to restrict unauthorized devices connecting to their network. What should they implement?

  • A Device Control
  • B Web Filtering
  • C Email Protection
  • D Application Control
Explanation Device Control specifically manages and restricts devices, whereas the others focus on different security areas.
Q180

What happens when a quarantined file is restored in Symantec Endpoint Security?

  • A It is immediately deleted
  • B It is scanned before restoration
  • C It is ignored and kept quarantined
  • D It is automatically Whitelisted
Explanation Restoration involves scanning to ensure safety, while the others do not accurately describe the restoration process.