Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Symantec 250-561 Dumps

Page: 1 / 3
Total 70 questions

Endpoint Security Complete - Administration R1 Questions and Answers

Question 1

In the ICDm, administrators are assisted by the My Task view. Which automation type creates the tasks within the console?

Options:

A.

Artificial Intelligence

B.

Machine Learning

C.

Advanced Machine Learning

D.

Administrator defined rules

Question 2

Which device page should an administrator view to track the progress of an issued device command?

Options:

A.

Command Status

B.

Command History

C.

Recent Activity

D.

Activity Update

Question 3

Which antimalware intensity level is defined by the following: "Blocks files that are most certainly bad or potentially bad files. Results in a comparable number of false positives and false negatives."

Options:

A.

Level 5

B.

Level 2

C.

Level 1

D.

Level 6

Question 4

What is the primary issue pertaining to managing roaming users while utilizing an on-premise solution?

Options:

A.

The endpoint is missing timely policy update

B.

The endpoint is absent of the management console

C.

The endpoint fails to receive content update

D.

The endpoint is more exposed to threats

Question 5

An endpoint is offline, and the administrator issues a scan command. What happens to the endpoint when it restarts, if it lacks connectivity?

Options:

A.

The system is scanning when started.

B.

The system downloads the content without scanning.

C.

The system starts without scanning.

D.

The system scans after the content update is downloaded.

Question 6

Which statement best describes Artificial Intelligence?

Options:

A.

A program that automates tasks with a static set of instructions

B.

A program that can predict when a task should be performed

C.

A program that is autonomous and needs training to perform a task

D.

A program that learns from experience and perform autonomous tasks

Question 7

Which SES security control protects against threats that may occur in the Impact phase?

Options:

A.

Device Control

B.

IPS

C.

Antimalware

D.

Firewall

Question 8

Which policy should an administrator edit to utilize the Symantec LiveUpdate server for pre-release content?

Options:

A.

The Firewall Policy

B.

The System Schedule Policy

C.

The System Policy

D.

The LiveUpdate Policy

Question 9

Which security threat uses malicious code to destroy evidence, break systems, or encrypt data?

Options:

A.

Execution

B.

Persistence

C.

Impact

D.

Discovery

Question 10

An administrator needs to create a new Report Template that will be used to track firewall activity. Which two (2) report template settings are optional? (Select 2)

Options:

A.

Output format

B.

Generation schedule

C.

Email recipients

D.

Time frame

E.

Size restrictions

Page: 1 / 3
Total 70 questions