A company needs to enforce software restriction policies. What is the best approach using Symantec Endpoint Security?
AUse Firewall configurations
BImplement Application Control policies
CDisable USB ports
DUtilize VPN services
Explanation
Application Control policies specifically manage software execution, unlike the others.
Q42
What happens when a client device is disconnected from the Symantec server for an extended period?
AIt automatically reinstalls the software
BIt loses all protection until reconnected
CIt continues protection with cached policies
DIt shuts down until reconnected
Explanation
The device retains cached policies for continued protection, while the other options are inaccurate.
Q43
Which service is responsible for managing endpoint behavior in Symantec Endpoint Security Complete?
AEndpoint Protection Manager
BSecurity Information Management
CNetwork Access Control
DData Loss Prevention
Explanation
Endpoint Protection Manager oversees endpoint security policies and management, unlike the others which serve different security functions.
Q44
A company needs to ensure visibility into its network threats. Which feature should be implemented?
AAdvanced Threat Protection
BData Encryption
CEmail Filtering
DBackup Solution
Explanation
Advanced Threat Protection provides visibility into network threats, while the others focus on different security aspects.
Q45
You are configuring endpoint detection. What happens when a detected threat is quarantined?
AIt is permanently deleted
BIt is isolated from the system
CUser is notified immediately
DThreat is ignored until further action
Explanation
Quarantining isolates the threat, preventing it from causing harm, while the other options describe incorrect actions regarding a threat.
Q46
Which service is responsible for enforcing security policies in Symantec Endpoint Protection?
APolicy Server
BClient Management Console
CApplication Control
DThreat Detection Module
Explanation
The Policy Server enforces security policies, while the other options serve different purposes.
Q47
A company needs to isolate an infected endpoint. What should they do with this endpoint?
ARemove it from the network
BRestrict user permissions
CRun a full system scan
DQuarantine it in the console
Explanation
Quarantining prevents further spread of malware, unlike the other actions.
Q48
You are configuring proactive threat detection. What happens when it's activated?
AReal-time scanning halts
BHeuristic detection is disabled
CSuspicious files are monitored
DAll traffic is blocked
Explanation
Proactive threat detection monitors behavior, while other options misrepresent its functionality.
Q49
Which service manages device compliance in Symantec Endpoint Security?
ADevice Compliance Service
BEndpoint Protection Service
CThreat Detection Service
DUser Behavior Analytics
Explanation
Device Compliance Service specifically handles compliance policies, while others manage different aspects of security.
Q50
A company needs to reduce false positives in malware alerts. What should they configure?
ALow sensitivity settings
BIncreased heuristic analysis
CCustomizable alert thresholds
DEnhanced behavioral monitoring
Explanation
Customizable alert thresholds help to adjust sensitivity precisely, unlike the other options which might not directly reduce false positives.