How would an administrator specify which remote consoles and servers have access to the management server?
Which client log shows that a client is downloading content from its designated source?
Which action must a Symantec Endpoint Protection administrator take before creating custom Intrusion Prevention signatures?
An organization identifies a threat in its environment and needs to limit the spread of the threat. How should the SEP Administrator block the threat using Application and Device Control?
When a SEPM is enrolled in ICDm, which policy can only be managed from the cloud?
The SES Intrusion Prevention System has blocked an intruder's attempt to establish an IRC connection inside the firewall. Which Advanced Firewall Protection setting should an administrator enable to prevent the intruder's system from communicating with the network after the IPS detection?
In what order should an administrator configure the integration between SEDR and Symantec Endpoint Protection in order to maximize their benefits?
What is the purpose of a Threat Defense for Active Directory Deceptive Account?
Which technique randomizes the memory address map with Memory Exploit Mitigation?
The Behavioral Heat Map indicates that a specific application and a specific behavior are never used together. What action can be safely set for the application behavior in a Behavioral Isolation policy?
Which antimalware intensity level is defined by the following: "Blocks files that are most certainly bad or potentially bad files results in a comparable number of false positives and false negatives."
What does an end-user receive when an administrator utilizes the Invite User feature to distribute the SES client?
How would an administrator specify which remote consoles and servers have access to the management server?
The Security Status on the console home page is failing to alert a Symantec Endpoint Protection (SEP) administrator when virus definitions are out of date.
How should the SEP administrator enable the Security Status alert?
The LiveUpdate Download Schedule is set to the default on the Symantec Endpoint Protection Manager (SEPM).
How many content revisions must the SEPM keep to ensure clients that check in to the SEPM every 10 days receive xdelta content packages instead of full content packages?
An administrator notices that some entries list that the Risk was partially removed. The administrator needs to determine whether additional steps are necessary to remediate the threat.
Where in the Symantec Endpoint Protection Manager console can the administrator find additional information on the risk?
What type of Threat Defense for Active Directory alarms are displayed after domain misconfigurations or hidden backdoors are detected?
In the virus and Spyware Protection policy, an administrator sets the First action to Clean risk and sets If first action fails to Delete risk. Which two (2) factors should the administrator consider? (Select two.)
An organization recently experienced an outbreak and is conducting a health check of the environment. What Protection Technology can the SEP team enable to control and monitor the behavior of applications?
Which protection technology can detect botnet command and control traffic generated on the Symantec Endpoint Protection client machine?
What are the two (2) locations where an Incident Responder should gather data for an After Actions Report in SEDR? (Select two)
Which SES security control protects a user against data leakage if they encounter a man-in-the-middle attack?
An administrator decides to migrate an SES Complete hybrid environment to a fully cloud-managed one. After cleaning up on-premise group structure and policies. What is the next recommended step for migration?
What is the purpose of a Threat Defense for Active Directory Deceptive Account?
An organization recently experienced an outbreak and is conducting a health check of the environment. What Protection Technology can the SEP team enable to control and monitor the behavior of applications?
The SES Intrusion Prevention System has blocked an intruder's attempt to establish an IRC connection inside the firewall. Which Advanced Firewall Protection setting should an administrator enable to prevent the intruder's system from communicating with the network after the IPS detection?
An administrator is troubleshooting a Symantec Endpoint Protection (SEP) replication.
Which component log should the administrator check to determine whether the communication between the two sites is working correctly?
An organization is considering a single site for their Symantec Endpoint Protection environment. What are two (2) reasons that the organization should consider? (Select two)
What protection technologies should an administrator enable to protect against Ransomware attacks?
Which security control is complementary to IPS, providing a second layer of protection against network attacks?
Which report template type should an administrator utilize to create a daily summary of network threats detected?