VMware
Symantec Endpoint Security Complete Admin R4 Technical Specialist
250-614
Get certified with the 250-614 exam focusing on Endpoint Security Complete.
192 questions
0 views
Free
Questions 81–90 of 192
What happens when a user disables the Symantec Endpoint Protection service?
-
A
All security features remain active
-
B
Immediate exposure to threats
-
C
Temporary deactivation of logging
-
D
Only firewall protection is lost
Explanation
Disabling the service exposes the system directly to security threats, while the other options inaccurately suggest partial protections.
Which service is responsible for network traffic filtering in Symantec Endpoint Security?
-
A
Firewall Service
-
B
Antivirus Service
-
C
Intrusion Prevention Service
-
D
Content Filtering Service
Explanation
The Firewall Service controls and filters network traffic, while the others focus on malware detection or data content.
A company needs to scan for vulnerabilities in its endpoints. What should they use?
-
A
Antivirus scan
-
B
Risk Management report
-
C
Security Assessment tool
-
D
Firewall logs
Explanation
A Security Assessment Tool conducts vulnerability scans, while the others do not fulfill this purpose.
You are configuring endpoint rules for silent detection. What will the 'silent mode' feature do?
-
A
Notify all users of detections
-
B
Limit detections to admin-only
-
C
Suppress alerts to end-users
-
D
Disable all detection features
Explanation
Silent mode suppresses end-user alerts, whereas other options either inform users or disable functionality.
Which service is essential for real-time threat detection in Symantec Endpoint Security?
-
A
File Integrity Monitoring
-
B
Behavioral Monitoring
-
C
Web Filtering
-
D
Email Encryption
Explanation
Behavioral Monitoring detects threats by observing system actions, while the others serve different security purposes.
A company needs to update its Symantec Endpoint client version. What is the recommended approach?
-
A
Use Windows Update
-
B
Manual installation only
-
C
Use Symantec LiveUpdate
-
D
Uninstall before updating
Explanation
Symantec LiveUpdate is designed for effective client updates, whereas the other options are not tailored for this task.
You are configuring application control policy. What happens when an application is not explicitly allowed?
-
A
It automatically runs without restrictions
-
B
It is blocked
-
C
A warning is displayed
-
D
It prompts for user action
Explanation
By default, if not allowed, an application is blocked under application control policies.
Which service offers centralized management of endpoint protection?
-
A
Symantec Endpoint Protection Manager
-
B
Symantec Cloud Backup Service
-
C
Symantec Web Filter Service
-
D
Symantec Data Loss Prevention
Explanation
Symantec Endpoint Protection Manager centralizes management, while others serve different functions.
A company needs to secure their virtual environment. Which feature of Symantec Endpoint Security should they prioritize?
-
A
Behavioral analytics
-
B
Hardware inventory management
-
C
Patch management automation
-
D
Application whitelisting
Explanation
Application whitelisting secures virtual environments by allowing only approved apps, unlike the other choices.
What happens when an unauthorized USB device is connected to an endpoint with Symantec Endpoint Security configured?
-
A
Device is automatically allowed access
-
B
Access is blocked by default policy
-
C
Company data is encrypted immediately
-
D
User is notified via email
Explanation
Unauthorized devices are blocked due to default security policies, while others are incorrect actions or outcomes.