Month End Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Symantec 250-550 Dumps Questions Answers

Page: 1 / 3
Total 1 questions

Endpoint Security Complete - Administration R1 Questions and Answers

Question 1

Which Anti-malware technology should an administrator utilize to expose the malicious nature of a file created with a custom packet?

Options:

A.

Sandbox

B.

SONAR

C.

Reputation

D.

Emulator

Buy Now
Question 2

Which antimalware intensity level is defined by the following: "Blocks files that are most certainly bad or potentially bad files. Results in a comparable number of false positives and false negatives."

Options:

A.

Level 5

B.

Level 2

C.

Level 1

D.

Level 6

Question 3

How long does a blacklist task remain in the My Tasks view after its automatic creation?

Options:

A.

180 Days

B.

30 Days

C.

60 Days

D.

90 Days

Question 4

Which Security Control dashboard widget should an administrator utilize to access detailed areas for a given security control ?

Options:

A.

Learn More

B.

Quick Links

C.

More Info

D.

Latest Tasks

Question 5

Which type of security threat is used by attackers to exploit vulnerable applications?

Options:

A.

Lateral Movement

B.

Privilege Escalation

C.

Command and Control

D.

Credential Access

Question 6

Which Antimalware technology is used after all local resources have been exhausted?

Options:

A.

Sapient

B.

ITCS

C.

Emulator

D.

Reputation

Question 7

Which IPS Signature type is Primarily used to identify specific unwanted traffic?

Options:

A.

Attack

B.

Probe

C.

Audit

D.

Malcode

Question 8

Which type of organization is likely to be targeted with emerging threats?

Options:

A.

Small organization with externalized managed security

B.

Large organizations with dedicated security teams

C.

Large organization with high turnover

D.

Small organization with little qualified staff

Question 9

Which two (2) options is an administrator able to use to prevent a file from being fasely detected (Select two)

Options:

A.

Assign the file a SHA-256 cryptographic hash

B.

Add the file to a Whitelist policy

C.

Reduce the Intensive Protection setting of the Antimalware policy

D.

Register the file with Symantec's False Positive database

E.

Rename the file

Question 10

Which URL is responsible for notifying the SES agent that a policy change occurred in the cloud console?

Options:

A.

spoc.norton.com

B.

stnd-ipsg.crsi-symantec.com

C.

ent-shasta.rrs-symantec.com

D.

ocsp.digicert.com

Page: 1 / 3
Total 1 questions