A company needs to ensure only specific applications can run on its endpoints. Which feature should they utilize?
AApplication Control
BDevice Control
CNetwork Access Control
DMalware Protection
Explanation
Application Control allows organizations to specify which applications are permitted to run, while the other options focus on different security aspects.
Q12
You are configuring alerts in Symantec Endpoint Security. What happens when you set a severity level to 'Info'?
ACritical alerts are generated.
BMinor alerts are ignored.
CAll alerts are displayed.
DOnly informational alerts are shown.
Explanation
Setting severity to 'Info' configures the system to display only informational alerts, while other severity levels handle alerts differently.
Q13
Which service in Symantec Endpoint Security provides real-time threat detection?
AInsight Threat Detection
BContent Filtering
CApplication Control
DData Loss Prevention
Explanation
Insight Threat Detection analyzes file reputation for immediate threats; others are security measures but not real-time detection.
Q14
A company needs to ensure comprehensive endpoint visibility and control. What feature should they prioritize?
AWeb Filtering
BSecurity Monitoring
CRemote Management
DApplication Whitelisting
Explanation
Security Monitoring provides essential visibility and insights; others focus on specific areas but lack comprehensive control.
Q15
You are configuring policies in Symantec Endpoint Security. What happens when a policy is configured but not assigned to any groups?
AIt becomes the default policy
BIt cannot be used
CIt is ignored completely
DIt applies to all endpoints
Explanation
The policy becomes the default policy until assigned; others misunderstand its status and application.
Q16
Which service in Symantec Endpoint Security allows for real-time monitoring of threats?
AThreat Response
BNetwork Protection
CFile Integrity Monitoring
DApplication Control
Explanation
Threat Response enables real-time threat monitoring; others focus on specific protective measures.
Q17
A company needs to ensure endpoint security for remote devices. What feature should they prioritize?
AIdle Timeout Settings
BCloud-Based Management
CLocal Scanning
DAsset Tagging
Explanation
Cloud-Based Management is critical for remote device security; others are not as relevant.
Q18
What happens when a user disables their Symantec Endpoint Security agent?
ASecurity breaches are prevented automatically
BThe device becomes fully vulnerable
CMonitoring alerts continue to function
DUpdates are installed silently
Explanation
Disabling the agent exposes the device to vulnerabilities; others are incorrect outcomes.
Q19
Which service provides advanced threat protection in Symantec Endpoint Security?
ANetwork Threat Protection
BMalware Insight
CBehavioral Monitoring
DWeb Security Service
Explanation
Behavioral Monitoring detects suspicious activities; others lack this focus.
Q20
A company needs to deploy Symantec Endpoint Security to 1,000 devices. What should be the first step?
AInstall client on each device
BSetup a management console
CAnalyze network vulnerabilities
DUpdate all devices' OS
Explanation
Setting up the management console is crucial before deploying clients.