Which service utilizes Machine Learning for threat detection?
ASymantec Behavioral Analysis
BWindows Defender
CSonicWall Firewall
DCisco Umbrella
Explanation
Symantec Behavioral Analysis uses ML for threats; the others are different security solutions.
Q62
A company needs to protect endpoints from ransomware attacks. What should they enable?
AApplication Control
BData Loss Prevention
CBackup and Restore
DURL Filtering
Explanation
Application Control blocks unauthorized applications; the others do not directly combat ransomware.
Q63
You are configuring the firewall rules in VMware. What happens when you set a rule to 'log only'?
AIt blocks the traffic only.
BIt logs the action but allows traffic.
CIt allows and logs only specific traffic.
DIt prevents all traffic from logging.
Explanation
'Log only' records actions without blocking; other options suggest restricting traffic.
Q64
Which service in Symantec Endpoint Security manages threat intelligence updates?
AIntelligence Cloud
BThreat Simulator
CEndpoint Protection Manager
DWeb Isolation Service
Explanation
Intelligence Cloud provides continuous threat intelligence; the other options do not handle updates directly.
Q65
A company needs to enforce compliance for device control policies. What feature is most effective?
AFull Disk Encryption
BApplication Control
CDevice Management Console
DContent Monitoring
Explanation
The Device Management Console allows enforcement of compliance; the others do not address device control directly.
Q66
What happens when malware is detected by a client but the server is unavailable?
AMalware is ignored by the client
BClient quarantines the potential threat
CMalware is immediately removed
DClient sends logs to the server
Explanation
The client quarantines the malware locally until server communication is restored; the other options are inaccurate actions taken in this situation.
Q67
Which service is primarily responsible for real-time threat detection in Symantec Endpoint Security Complete?
AAdvanced Threat Protection
BNetwork Access Control
CData Loss Prevention
DCentral Management Console
Explanation
Advanced Threat Protection focuses on real-time threat detection, while the others serve different purposes.
Q68
A company needs to ensure that sensitive data remains encrypted both at rest and in transit. Which Symantec feature should they implement?
AEndpoint Encryption
BEmail Security
CDevice Control
DWeb Security
Explanation
Endpoint Encryption secures data wherever it resides, unlike the other options.
Q69
You are configuring Symantec Endpoint Security. What happens when a system's policy is set to 'Quarantine' for detected threats?
AThreats are permanently deleted
BThreats are isolated for review
CNo action is taken
DAll network access is blocked
Explanation
Quarantine isolates threats for further analysis, unlike the others which do not accurately describe the action.
Q70
Which service in Symantec Endpoint Security provides real-time threat detection?
AProactive Threat Protection
BCentralized Management Console
CIntegrated Spam Filter
DWeb Isolation Service
Explanation
Proactive Threat Protection detects threats in real-time; others are not real-time threat detection services.