VMware
Symantec Endpoint Security Complete Admin R4 Technical Specialist
250-614
Get certified with the 250-614 exam focusing on Endpoint Security Complete.
192 questions
0 views
Free
Questions 191–192 of 192
A company needs to deploy Symantec Endpoint Security on mobile devices. Which feature should they prioritize?
-
A
Data Encryption
-
B
File System Management
-
C
User Access Control
-
D
Application Control
Explanation
Data encryption is critical for securing mobile devices, unlike file management or control features.
You are configuring policies for a network. What happens when the policy is set to 'Monitor only'?
-
A
Action is taken against threats
-
B
Policy violations are logged only
-
C
All users will be blocked
-
D
Threats will be ignored
Explanation
'Monitor only' logs violations without taking action, whereas the other options imply different outcomes.