VMware

Symantec Endpoint Security Complete Admin R4 Technical Specialist

250-614

Get certified with the 250-614 exam focusing on Endpoint Security Complete.

192 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 61–70 of 192

Q61

Which service utilizes Machine Learning for threat detection?

  • A Symantec Behavioral Analysis
  • B Windows Defender
  • C SonicWall Firewall
  • D Cisco Umbrella
Explanation Symantec Behavioral Analysis uses ML for threats; the others are different security solutions.
Q62

A company needs to protect endpoints from ransomware attacks. What should they enable?

  • A Application Control
  • B Data Loss Prevention
  • C Backup and Restore
  • D URL Filtering
Explanation Application Control blocks unauthorized applications; the others do not directly combat ransomware.
Q63

You are configuring the firewall rules in VMware. What happens when you set a rule to 'log only'?

  • A It blocks the traffic only.
  • B It logs the action but allows traffic.
  • C It allows and logs only specific traffic.
  • D It prevents all traffic from logging.
Explanation 'Log only' records actions without blocking; other options suggest restricting traffic.
Q64

Which service in Symantec Endpoint Security manages threat intelligence updates?

  • A Intelligence Cloud
  • B Threat Simulator
  • C Endpoint Protection Manager
  • D Web Isolation Service
Explanation Intelligence Cloud provides continuous threat intelligence; the other options do not handle updates directly.
Q65

A company needs to enforce compliance for device control policies. What feature is most effective?

  • A Full Disk Encryption
  • B Application Control
  • C Device Management Console
  • D Content Monitoring
Explanation The Device Management Console allows enforcement of compliance; the others do not address device control directly.
Q66

What happens when malware is detected by a client but the server is unavailable?

  • A Malware is ignored by the client
  • B Client quarantines the potential threat
  • C Malware is immediately removed
  • D Client sends logs to the server
Explanation The client quarantines the malware locally until server communication is restored; the other options are inaccurate actions taken in this situation.
Q67

Which service is primarily responsible for real-time threat detection in Symantec Endpoint Security Complete?

  • A Advanced Threat Protection
  • B Network Access Control
  • C Data Loss Prevention
  • D Central Management Console
Explanation Advanced Threat Protection focuses on real-time threat detection, while the others serve different purposes.
Q68

A company needs to ensure that sensitive data remains encrypted both at rest and in transit. Which Symantec feature should they implement?

  • A Endpoint Encryption
  • B Email Security
  • C Device Control
  • D Web Security
Explanation Endpoint Encryption secures data wherever it resides, unlike the other options.
Q69

You are configuring Symantec Endpoint Security. What happens when a system's policy is set to 'Quarantine' for detected threats?

  • A Threats are permanently deleted
  • B Threats are isolated for review
  • C No action is taken
  • D All network access is blocked
Explanation Quarantine isolates threats for further analysis, unlike the others which do not accurately describe the action.
Q70

Which service in Symantec Endpoint Security provides real-time threat detection?

  • A Proactive Threat Protection
  • B Centralized Management Console
  • C Integrated Spam Filter
  • D Web Isolation Service
Explanation Proactive Threat Protection detects threats in real-time; others are not real-time threat detection services.