A) Block
B) Skip
C) Quarantine
D) Log
E) Delete
Correct Answer
verified
Multiple Choice
A) a file and folder exception in the Exception policy
B) an application rule set in the Application and Device Control policy
C) a file fingerprint list and System Lockdown
D) the Tamper Protection settings for the client folder
Correct Answer
verified
Multiple Choice
A) LiveUpdate stops.
B) Proactive Threat Protection is disabled.
C) SEP clients become unmanaged.
D) Content updates are allowed.
Correct Answer
verified
Multiple Choice
A) sensitivity
B) prevalence
C) confidentiality
D) content
E) age
Correct Answer
verified
Multiple Choice
A) It would block files that trend towards a poor reputation and decrease false positives.
B) It would allow only files with a good reputation and decrease false positives.
C) It would allow only files that trend toward a good reputation and increases false positives.
D) It would block files that have a poor reputation and decrease false positives.
Correct Answer
verified
Multiple Choice
A) set Disable antivirus alert within Windows Security Center to Disable
B) set Disable antivirus alert within Windows Security Center to Never
C) set Disable Windows Security Center to Disable
D) set Disable Windows Security Center to Always
Correct Answer
verified
Multiple Choice
A) Virus and Spyware definitions
B) File Fingerprint list
C) Symantec Insight
D) Extended File Attributes (EFA) table
Correct Answer
verified
Multiple Choice
A) in the firewall policy, under Protection and Stealth
B) in the firewall policy, under Built in Rules
C) in the group policy, under External Communication Settings
D) in the group policy, under Communication Settings
Correct Answer
verified
Multiple Choice
A) Push mode
B) Client Deployment Wizard
C) Pull mode
D) Unmanaged Detector
Correct Answer
verified
Multiple Choice
A) Internet Email Auto-Protect
B) Microsoft Outlook Auto-Protect
C) Lotus Notes Auto-Protect
D) SONAR
Correct Answer
verified
Multiple Choice
A) false negatives
B) false positives
C) performance issues
D) higher rejection rate
Correct Answer
verified
Multiple Choice
A) Application and Device Control
B) SONAR
C) TruScan
D) Host Integrity
Correct Answer
verified
Multiple Choice
A) SONAR
B) Reputation Scans
C) Auto-Protect
D) Scheduled Scans
Correct Answer
verified
Multiple Choice
A) Commercial Application Detection
B) Suspicious Behavior Detection
C) System Change Events
D) Signature Based Detection
Correct Answer
verified
Multiple Choice
A) All clients will run scans only on Monday.
B) All clients will run scans both on Monday and Wednesday.
C) The laptops will run scans only on Wednesday, while the desktops will run scans only on Monday.
D) The laptops will run scans both the Monday and Wednesday, while the desktops will run scans only on Monday.
Correct Answer
verified
Multiple Choice
A) allow unknown files to be downloaded with Insight
B) prevent programs from running
C) prevent AntiVirus from scanning a file
D) allow files to bypass Intrusion Prevention detection
Correct Answer
verified
Multiple Choice
A) The client chooses another server in the list randomly.
B) The client chooses a server based on the lowest server load.
C) The client chooses a server with the next highest IP address.
D) The client chooses the next server alphabetically by server name.
Correct Answer
verified
Multiple Choice
A) Host Integrity Policy
B) Virus and Spyware Protection Policy
C) Exceptions Policy
D) Application and Device Control Policy
Correct Answer
verified
Multiple Choice
A) create an Allow Firewall rule for the application and place it at the bottom of the firewall rules below the blue line
B) create an Allow Firewall rule for the application and place it at the bottom of the firewall rules above the blue line
C) create an Allow All Firewall rule for the fingerprint of the file and place it at the bottom of the firewall rules above the blue line
D) create an Allow for the network adapter type used by the application and place it at the top of the firewall rules below the blue line
Correct Answer
verified
Multiple Choice
A) Install a Group Update Provider at each datacenter and configure replication.
B) Install a Symantec Protection Center at each datacenter and configure replication.
C) Install a Symantec Endpoint Protection Manager at each datacenter and configure replication.
D) Install a Symantec Site Server at each datacenter and configure replication.
Correct Answer
verified
Showing 121 - 140 of 165
Related Exams