VMware

Symantec Endpoint Security Complete Admin R4 Technical Specialist

250-614

Get certified with the 250-614 exam focusing on Endpoint Security Complete.

192 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 71–80 of 192

Q71

A company needs to ensure that all removable storage devices are encrypted. What should you configure in Symantec?

  • A Device Control Policy
  • B Network Access Control
  • C Advanced Threat Protection
  • D Email Security Policy
Explanation Device Control Policy is intended for managing storage device encryption, while others serve different functions.
Q72

You are configuring a web proxy in Symantec Endpoint Security. What happens when SSL interception is enabled?

  • A Unencrypted traffic is blocked
  • B Traffic is decrypted and inspected
  • C All traffic is allowed without inspection
  • D Only local traffic is intercepted
Explanation With SSL interception enabled, traffic is decrypted and inspected for threats; the other options misrepresent the function.
Q73

Which service is primarily responsible for endpoint threat detection?

  • A Symantec Endpoint Protection
  • B Network Access Control
  • C Web Security Service
  • D Data Loss Prevention
Explanation Symantec Endpoint Protection specializes in detecting threats on endpoints; others focus on network or data concerns.
Q74

A company needs to secure their mobile devices from malware. What is the best initial step?

  • A Install antivirus on endpoints
  • B Implement a Mobile Device Management solution
  • C Use stronger passwords
  • D Limit network access
Explanation A Mobile Device Management solution provides comprehensive management and security for mobile endpoints, unlike the other options which are less effective alone.
Q75

What happens when an endpoint is quarantined by Symantec Endpoint Security?

  • A It is permanently deleted
  • B It is isolated for analysis
  • C It is restored immediately
  • D It loses network connectivity
Explanation Quarantining isolates the endpoint to prevent spread and allows for analysis, unlike deletion or immediate restoration.
Q76

Which service in Symantec Endpoint Security handles IP-based web protection?

  • A Web Security Service
  • B Threat Intelligence Service
  • C Email Protection Service
  • D Data Loss Prevention Service
Explanation The Web Security Service specifically focuses on IP-based web protection while others serve different functions.
Q77

A company needs to ensure that devices are automatically quarantined if they fail the compliance check. Which feature should they configure?

  • A Compliance Enforcement
  • B Endpoint Isolation
  • C Risk Assessment
  • D Policy Exceptions
Explanation Endpoint Isolation automatically quarantines non-compliant devices, unlike other features which serve different purposes.
Q78

What happens when a user configures a policy to disable heuristic scanning?

  • A Improved performance on all endpoints
  • B Increased risk of zero-day threats
  • C No impact on malware detection
  • D Completely disabled antivirus function
Explanation Disabling heuristic scanning increases vulnerability to zero-day threats, while the others are incorrect regarding impact.
Q79

Which service does Symantec Endpoint Security Complete use for real-time threat intelligence?

  • A Symantec Global Intelligence Network
  • B Advanced Threat Protection
  • C Endpoint Detection and Response
  • D Security Information Management
Explanation The Symantec Global Intelligence Network provides real-time threat data, while the others focus on detection or mitigation.
Q80

A company needs to configure application control. What should be the first step?

  • A Create blocking rules
  • B Identify applications to control
  • C Enable logging for all apps
  • D Update endpoint definitions
Explanation Identifying applications is essential to set control parameters first, whereas the others rely on having a defined scope.