You are configuring Symantec Endpoint Security for a new deployment. What happens when you do not set up a security policy for a group?
AGroup inherits default policy settings
BNo protection is applied to group
CGroup will cause system errors
DAlerts are turned off for group
Explanation
If no policy is set, the group inherits the default policy which provides basic protection, contrary to the other options.
Q52
Which service provides advanced threat protection in Symantec Endpoint Security?
AAdvanced Threat Protection
BBasic Malware Prevention
CUser Behavior Analytics
DNetwork Firewall Management
Explanation
Advanced Threat Protection identifies and mitigates threats before they impact systems, while the others are not specifically threat prevention services.
Q53
A company needs to secure remote endpoints. Which policy should be implemented for secure device access?
ADevice Encryption Policy
BFirewall Configuration Policy
CEndpoint Integrity Policy
DRemote Access Policy
Explanation
The Remote Access Policy specifically governs secure device access, while others focus on different aspects of endpoint security.
Q54
What happens when a quarantined file is restored?
AFile becomes immediately active
BFile is deleted permanently
CFile is checked for safety
DFile is only visible to admins
Explanation
When restored, the file undergoes a safety check to ensure it’s not harmful, while the other options are incorrect actions regarding the file's status.
Q55
Which service is primarily responsible for endpoint protection in Symantec Endpoint Security Complete?
ASymantec Endpoint Protection
BSymantec Data Loss Prevention
CSymantec IT Management Suite
DSymantec Infrastructure Protection
Explanation
Symantec Endpoint Protection is designed for endpoint protection, while others focus on different security aspects.
Q56
A company needs to implement role-based access control in Symantec Endpoint Security. Which feature should they use?
AUser Groups
BMalware Protection
CNetwork Monitoring
DBackup and Recovery
Explanation
User Groups allow defining access rights for various roles, which is essential for role-based control.
Q57
You are configuring a firewall policy in Symantec Endpoint Security. What happens when the policy is set to 'Block All'?
AOnly trusted applications can communicate.
BAll inbound and outbound traffic is denied.
CTraffic from the local network is allowed.
DExceptions to allowed traffic must be defined.
Explanation
'Block All' denies all traffic unless explicitly allowed, contrasting the other options which imply different traffic management scenarios.
Q58
Which service is primarily responsible for managing updates in Symantec Endpoint Security?
ALiveUpdate
BPolicy Management
CData Loss Prevention
DActive Directory Integration
Explanation
LiveUpdate is responsible for managing updates, while the others serve different purposes.
Q59
A company needs to protect sensitive data on mobile devices. Which feature should they enable in Symantec Endpoint Security?
ANetwork Flow Monitoring
BEndpoint Encryption
CPatch Management
DCloud Application Security
Explanation
Endpoint Encryption secures sensitive data on devices, unlike the other options.
Q60
What happens when a quarantine file is restored in Symantec Endpoint Security?
AIt is deleted immediately
BIt is restored without checks
CIt is checked before restoration
DIt is moved to external storage
Explanation
Restored files are checked for threats to ensure safety, unlike options A, B, or D.