A company needs to ensure that all removable storage devices are encrypted. What should you configure in Symantec?
ADevice Control Policy
BNetwork Access Control
CAdvanced Threat Protection
DEmail Security Policy
Explanation
Device Control Policy is intended for managing storage device encryption, while others serve different functions.
Q72
You are configuring a web proxy in Symantec Endpoint Security. What happens when SSL interception is enabled?
AUnencrypted traffic is blocked
BTraffic is decrypted and inspected
CAll traffic is allowed without inspection
DOnly local traffic is intercepted
Explanation
With SSL interception enabled, traffic is decrypted and inspected for threats; the other options misrepresent the function.
Q73
Which service is primarily responsible for endpoint threat detection?
ASymantec Endpoint Protection
BNetwork Access Control
CWeb Security Service
DData Loss Prevention
Explanation
Symantec Endpoint Protection specializes in detecting threats on endpoints; others focus on network or data concerns.
Q74
A company needs to secure their mobile devices from malware. What is the best initial step?
AInstall antivirus on endpoints
BImplement a Mobile Device Management solution
CUse stronger passwords
DLimit network access
Explanation
A Mobile Device Management solution provides comprehensive management and security for mobile endpoints, unlike the other options which are less effective alone.
Q75
What happens when an endpoint is quarantined by Symantec Endpoint Security?
AIt is permanently deleted
BIt is isolated for analysis
CIt is restored immediately
DIt loses network connectivity
Explanation
Quarantining isolates the endpoint to prevent spread and allows for analysis, unlike deletion or immediate restoration.
Q76
Which service in Symantec Endpoint Security handles IP-based web protection?
AWeb Security Service
BThreat Intelligence Service
CEmail Protection Service
DData Loss Prevention Service
Explanation
The Web Security Service specifically focuses on IP-based web protection while others serve different functions.
Q77
A company needs to ensure that devices are automatically quarantined if they fail the compliance check. Which feature should they configure?
ACompliance Enforcement
BEndpoint Isolation
CRisk Assessment
DPolicy Exceptions
Explanation
Endpoint Isolation automatically quarantines non-compliant devices, unlike other features which serve different purposes.
Q78
What happens when a user configures a policy to disable heuristic scanning?
AImproved performance on all endpoints
BIncreased risk of zero-day threats
CNo impact on malware detection
DCompletely disabled antivirus function
Explanation
Disabling heuristic scanning increases vulnerability to zero-day threats, while the others are incorrect regarding impact.
Q79
Which service does Symantec Endpoint Security Complete use for real-time threat intelligence?
ASymantec Global Intelligence Network
BAdvanced Threat Protection
CEndpoint Detection and Response
DSecurity Information Management
Explanation
The Symantec Global Intelligence Network provides real-time threat data, while the others focus on detection or mitigation.
Q80
A company needs to configure application control. What should be the first step?
ACreate blocking rules
BIdentify applications to control
CEnable logging for all apps
DUpdate endpoint definitions
Explanation
Identifying applications is essential to set control parameters first, whereas the others rely on having a defined scope.