<< Prev Question Next Question >>

Question 5/250

A Symantec Endpoint Protection Manager (SEPM) administrator is importing from an Active Directory
environment. The administrator needs to know which object types are being imported. Which two object
types are imported into the SEPM from Active Directory? (Select two.)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (250q)
1 commentQuestion 1: A company needs to forward log data from Data Center A to Da...
Question 2: Which two can be used when defining location switching crite...
Question 3: A company is currently testing Symantec Endpoint Protection ...
Question 4: An administrator is testing a new Application and Device Con...
Question 5: A Symantec Endpoint Protection Manager (SEPM) administrator ...
Question 6: Refer to the exhibit. (Exhibit) The status of two clients on...
Question 7: An administrator needs to exclude some servers from an Intru...
Question 8: A Symantec Endpoint Protection (SEP) administrator is remote...
Question 9: Which two considerations must an administrator make when ena...
1 commentQuestion 10: An administrator wants to deploy the Symantec Endpoint Prote...
Question 11: A Symantec Endpoint Protection 12.1 administrator has the Vi...
Question 12: The Symantec Endpoint Protection 12.1 (SEP) client indicates...
Question 13: What are two responsibilities associated with the Limited Ad...
Question 14: In a management server list, Symantec Endpoint Protection Ma...
Question 15: A company receives a high number of reports from users that ...
Question 16: An administrator notices that the Symantec Endpoint Protecti...
Question 17: A managed service provider (MSP) is managing Symantec Endpoi...
Question 18: Which Intrusion Prevention feature is updated automatically?...
Question 19: In addition to adding exceptions directly into an Exceptions...
Question 20: An administrator reports that the Home, Monitors, and Report...
Question 21: Which two criteria can be used to determine hosts in a host ...
Question 22: What is a function of the Symantec Endpoint Protection clien...
Question 23: Which protection engine should be enabled to drop malicious ...
Question 24: A company has a firewall policy with a rule that allows all ...
Question 25: What is a supported migration path for Symantec Endpoint Pro...
Question 26: Which two items should an administrator enter in the License...
Question 27: Which Symantec Endpoint Protection 12.1 protection technolog...
Question 28: A company has deployed Symantec Endpoint Protection 12.1 in ...
Question 29: Which Symantec Endpoint Protection technology blocks a downl...
Question 30: Refer to the exhibit. (Exhibit) An administrator uses the se...
Question 31: A company recently purchased the Symantec Endpoint Protectio...
Question 32: Which port is used by default for replication between sites?...
Question 33: An administrator changes the Virus and Spyware Protection po...
Question 34: What are two supported Symantec Endpoint Protection Manager ...
Question 35: A system running Symantec Endpoint Protection is assigned to...
Question 36: A Symantec Endpoint Protection 12.1 client is running a user...
Question 37: A Symantec Endpoint Protection 12.1 (SEP) administrator susp...
Question 38: Which action must a Symantec Endpoint Protection administrat...
Question 39: An administrator set the remediation options for Security Ri...
Question 40: An administrator selects the Backup files before attempting ...
Question 41: A Microsoft SQL Server containing a Symantec Endpoint Protec...
Question 42: A company is concerned that its clients may be out-of-date a...
Question 43: An administrator defines the Active Directory settings in th...
Question 44: Which statement describes a difference between Virtual Image...
Question 45: An administrator configures the scan duration for a schedule...
Question 46: What is an appropriate use of a file fingerprint list?...
Question 47: What is a function of Symantec Insight?...
Question 48: Which action does SONAR take before convicting a process?...
Question 49: What is the likely impact of increasing the Download Insight...
Question 50: When can an administrator add a new replication partner?...
Question 51: A user is unknowingly about to connect to a malicious websit...
Question 52: Which Symantec Endpoint Protection Management (SEPM) databas...
Question 53: Which two options can administrators customize on the Home p...
Question 54: Which Symantec Endpoint Protection 12.1 component provides s...
Question 55: The Security Status on the console home page is failing to a...
Question 56: What does SONAR use to reduce false positives?...
Question 57: Which two criteria can be used to determine hosts in a host ...
Question 58: In which two situations would Symantec Endpoint Protection 1...
Question 59: Why does Power Eraser need Internet access?...
Question 60: Where is a file encrypted and saved to when the "Backup file...
Question 61: A Symantec Endpoint Protection administrator is using System...
Question 62: Which notification action can be performed when a security-r...
Question 63: Which two are policy types within the Symantec Endpoint Prot...
Question 64: Which action can an administrator take to improve the Symant...
Question 65: An administrator is using the SylinkDrop tool to update a Sy...
Question 66: An administrator receives a browser certificate warning when...
Question 67: Refer to the exhibit. (Exhibit) A company has created a spec...
Question 68: An administrator is in the process of recovering from a disa...
Question 69: A large software company has a small engineering department ...
Question 70: A company has a single datacenter at its main office and 10 ...
Question 71: A Symantec Endpoint Protection administrator needs to comply...
Question 72: Refer to the exhibit. (Exhibit) An administrator has configu...
Question 73: A managed Symantec Endpoint Protection 12.1 (SEP) client is ...
Question 74: According to Symantec best practices, which two tasks should...
Question 75: Which two criteria should an administrator use when defining...
Question 76: Which Symantec Endpoint Protection 12.1 feature allows an ad...
Question 77: Refer to the exhibit. (Exhibit) A user runs a full scan on a...
Question 78: Which two are optional when replicating between Symantec End...
Question 79: A computer is configured in Mixed Control mode. The administ...
Question 80: An administrator enables the "Learn applications that run on...
Question 81: A company allows users to create firewall rules. During the ...
Question 82: In which client management log can an administrator identify...
Question 83: A Symantec Endpoint Protection 12.1 group has two defined lo...
Question 84: What is a valid Symantec Endpoint Protection (SEP) single si...
Question 85: Which two instances could cause Symantec Endpoint Protection...
Question 86: A Symantec Endpoint Protection administrator needs to preven...
Question 87: Which option is unavailable in the Symantec Endpoint Protect...
Question 88: What is the first step an administrator should take in order...
Question 89: A company wants its clients to use the Group Update Provider...
Question 90: An administrator is logged in to the Symantec Endpoint Prote...
Question 91: An administrator is recovering from a Symantec Endpoint Mana...
Question 92: Which Symantec Endpoint Protection client component must be ...
Question 93: Which step must be completed to set up two sites to replicat...
Question 94: According to Symantec, what is a botnet?...
Question 95: Which technology uses heuristics to scan outbound email?...
Question 96: An administrator needs to ensure that a specific network thr...
Question 97: Administrators at a company share a single terminal for conf...
Question 98: Which two sources can a Macintosh client use to download con...
Question 99: Which action does the Shared Insight Cache (SIC) server take...
Question 100: Which setting can an administrator configure in the LiveUpda...
Question 101: A Symantec Endpoint Protection Manager (SEPM) administrator ...
Question 102: A company is experiencing a malware outbreak. The company de...
Question 103: A company needs to configure an Application and Device Contr...
Question 104: Which Symantec Endpoint Protection 12.1 component improves p...
Question 105: A clean file in a proprietary application has been quarantin...
Question 106: A company is transitioning from using policies based on the ...
Question 107: A Symantec Endpoint Protection administrator must block traf...
Question 108: A company creates free web access computers for use in publi...
Question 109: Which feature can be configured to increase or decrease perf...
Question 110: How can an administrator manage multiple, independent compan...
Question 111: In Symantec Endpoint Protection 12.1 Enterprise Edition (SEP...
Question 112: A financial company enforces a security policy that prevents...
Question 113: In addition to performance improvements, which two benefits ...
Question 114: An administrator enabled virtual image exceptions for Auto-P...
Question 115: Which two Symantec Endpoint Protection components are used t...
Question 116: What could be an adverse effect of activating aggressive mod...
Question 117: A company is deploying Symantec Endpoint Protection 12.1 and...
Question 118: An administrator wants to ensure that all clients consider t...
Question 119: A new installation of the Symantec Endpoint Protection 12.1 ...
Question 120: An exception needs to be created for a file named "RunMe.exe...
Question 121: Which two Symantec Endpoint Protection 12.1 (SEP) standalone...
Question 122: Which protection technology can detect botnet command and co...
Question 123: A large oil company has a small exploration department that ...
Question 124: An administrator needs to determine which versions of Symant...
Question 125: A company selected Opera 10 as its corporate browser. Drive-...
Question 126: A company is building a new Symantec Endpoint Protection Man...
Question 127: An administrator notices that some entries list that the Ris...
Question 128: Which component is required in order to run Symantec Endpoin...
Question 129: A company organizes its clients into two groups, the Symante...
Question 130: A client is unable to communicate with the Symantec Endpoint...
Question 131: Which Symantec Endpoint Protection component enables access ...
Question 132: A company wants to reduce or eliminate the HelpDesk calls th...
Question 133: After several failed logon attempts, the Symantec Endpoint P...
Question 134: An administrator needs to check when and by which account a ...
Question 135: Which operation can be performed using the Database Back Up ...
Question 136: An administrator is modifying a Virus and Spyware Protection...
Question 137: An administrator needs to configure Secure Socket Layer (SSL...
Question 138: A large-scale virus attack is occurring and a notification c...
Question 139: Multiple Windows virtual clients running on an ESX server ne...
Question 140: An administrator uses ClientSideClonePrepTool to clone syste...
Question 141: Where in the Symantec Endpoint Protection (SEP) management c...
Question 142: Which Symantec Endpoint Protection 12.1 component uses reput...
Question 143: Which Symantec Endpoint Protection defense mechanism provide...
Question 144: An administrator enabled the default application control rul...
Question 145: A large set of static PDF files stored on a single virtual c...
Question 146: Drive-by downloads are a common vector of infections. Some o...
Question 147: Which two configuration elements are needed in order to add ...
Question 148: A large enterprise plans to deploy Symantec Endpoint Protect...
Question 149: An administrator is re-adding an existing Replication Partne...
Question 150: A company plans to install six Symantec Endpoint Protection ...
Question 151: A system administrator created a firewall policy that allows...
Question 152: Which action should an administrator take to prevent users f...
Question 153: A company plans to expand its Symantec Endpoint Protection 1...
Question 154: An administrator is troubleshooting a Symantec Endpoint Prot...
Question 155: A company is setting up a new environment with three Symante...
Question 156: You have just started a relayout operation in a live test en...
Question 157: What are two criteria that Symantec Insight uses to evaluate...
Question 158: An organization employs laptop users who travel frequently. ...
Question 159: An administrator is designing a new single site Symantec End...
Question 160: An administrator creates a new domain in the Symantec Endpoi...
Question 161: What is the default replication frequency when adding an add...
Question 162: Refer to the exhibit. (Exhibit) Which settings can impact th...
Question 163: A Symantec Endpoint Protection (SEP) client uses a managemen...
Question 164: An administrator has installed Symantec Endpoint Protection ...
Question 165: A Symantec Endpoint Protection 12.1 (SEP) administrator is r...
Question 166: A company needs to prevent users from modifying files in a s...
Question 167: An employee is taking leave for four months and the employee...
Question 168: Which command line syntax invokes the Symantec Endpoint Prot...
Question 169: A financial company has a security policy that prevents bank...
Question 170: Which two should be considered when enabling Application Lea...
Question 171: Which command attempts to find the name of the drive in the ...
Question 172: Which ports on the company firewall must an administrator op...
Question 173: In which two areas can host groups be used? (Select two.)...
Question 174: For replication, Symantec recommends that the number of site...
Question 175: A company suffered a catastrophic hardware failure on the Sy...
Question 176: A Symantec Endpoint Protection (SEP) administrator creates a...
Question 177: Which Symantec Endpoint Protection 12.1 defense mechanism pr...
Question 178: Users report abnormal behavior on systems where Symantec End...
Question 179: (Exhibit) An administrator defines the Active Directory sett...
Question 180: How can an administrator proactively obtain information abou...
Question 181: How are Insight results stored?...
Question 182: A Symantec Endpoint Protection (SEP) administrator performed...
Question 183: A user added a daily 10:00 scheduled scan to their Symantec ...
Question 184: An administrator is reviewing risk logs in the Symantec Endp...
Question 185: An administrator needs to increase the access speed for clie...
Question 186: Which type of email does Internet Email Auto-Protect support...
Question 187: A manufacturing company runs three shifts. Employees at the ...
Question 188: Which client log shows that a client is downloading content ...
Question 189: An administrator wants to make sure users are warned when th...
Question 190: Which setting can an administrator change that will result i...
Question 191: What is a characteristic of a Symantec Endpoint Protection (...
Question 192: How frequently does Symantec recommend that a Symantec Endpo...
Question 193: Which Symantec Endpoint Protection 12.1 component provides s...
Question 194: How can a Symantec Endpoint Protection 12.1 client on a Maci...
Question 195: Refer to the exhibit. (Exhibit) What does the symbol to the ...
Question 196: A company is building a new Symantec Endpoint Protection Man...
Question 197: A company is running the Symantec Endpoint Protection 12.1 f...
Question 198: When the Symantec Endpoint Protection 12.1 client firewall d...
Question 199: An administrator has defined a rule to allow traffic to and ...
Question 200: Which authentication method must be used to provide the abil...
Question 201: By default, the Client User Interface control is set to Serv...
Question 202: A threat was detected by Auto-Protect on a client system. Wh...
Question 203: In the virus and Spyware Protection policy, an administrator...
Question 204: An administrator makes a change in the Active Directory stru...
Question 205: Which object in the Symantec Endpoint Protection Manager con...
Question 206: Where can an administrator obtain the Sylink.xml file?...
Question 207: Which statement is true about the Database Backup and Restor...
Question 208: An administrator needs to add an Application Exception. When...
Question 209: Some customers report that when they run the command "smc -s...
Question 210: In Symantec Endpoint Protection 12.1 Enterprise Edition, wha...
Question 211: Acrobat Reader is being targeted by a threat using process i...
Question 212: A Symantec Endpoint Protection 12.1 (SEP) administrator disc...
Question 213: A company has a small number of systems in their Symantec En...
Question 214: A company has an application that requires network traffic i...
Question 215: The fake antivirus family "PC scout" infects systems with a ...
Question 216: The LiveUpdate Download Schedule is set to the default on th...
Question 217: A company deploys Symantec Endpoint Protection client to its...
Question 218: An administrator is responsible for the Symantec Endpoint Pr...
Question 219: Which Symantec Endpoint Protection Manager feature allows an...
Question 220: Which two options are available when configuring high risk d...
Question 221: Which technology does the Symantec Endpoint Protection Firew...
Question 222: A large software company runs a small engineering department...
Question 223: Which exception type can be configured?...
Question 224: An administrator is restoring a Microsoft SQL Symantec Endpo...
Question 225: How many Symantec Endpoint Protection Managers can connect t...
Question 226: Refer to the exhibit. (Exhibit) Inheritance is turned on onl...
Question 227: Which step is unnecessary when an administrator creates an a...
Question 228: Which task should an administrator perform to troubleshoot o...
Question 229: An administrator plans to implement a multi-site Symantec En...
Question 230: Which policy should an administrator modify to enable Virtua...
Question 231: Which two criteria can an administrator use to determine hos...
Question 232: What are two default access rights for various types of Syma...
Question 233: A Symantec Endpoint Protection (SEP) administrator receives ...
Question 234: A user is downloading a file from https://www.example.com to...
Question 235: A company has three groups of clients: Laptops, Desktops, an...
Question 236: A Symantec Endpoint Protection 12.1 (SEP) administrator depl...
Question 237: Company A acquires Company B. Company B has 200 employees. M...
Question 238: An administrator is reviewing an Infected Clients Report and...
Question 239: Which tool should an administrator use to discover and deplo...
Question 240: Refer to the exhibit. (Exhibit) A company is using a custom ...
Question 241: An administrator needs to customize the Application and Devi...
Question 242: A LiveUpdate policy allows for configuring single Group Upda...
Question 243: Where are directory servers added before importing Organizat...
Question 244: Which task is unavailable for administrative accounts that a...
Question 245: A company deploys Symantec Endpoint Protection (SEP) to 50 v...
Question 246: A company suffered catastrophic hardware failure on the Syma...
Question 247: What is the file scan workflow order when Shared Insight Cac...
Question 248: Which tool should the administrator run before starting the ...
Question 249: Which two actions can a user take during an in-progress sche...
Question 250: An administrator gets a browser certificate warning when acc...