<< Prev Question Next Question >>

Question 146/250

Drive-by downloads are a common vector of infections. Some of these attacks use encryption to bypass
traditional defense mechanisms. Which Symantec Endpoint Protection 12.1 protection technology blocks
such obfuscated attacks?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (250q)
1 commentQuestion 1: A company needs to forward log data from Data Center A to Da...
Question 2: Which two can be used when defining location switching crite...
Question 3: A company is currently testing Symantec Endpoint Protection ...
Question 4: An administrator is testing a new Application and Device Con...
Question 5: A Symantec Endpoint Protection Manager (SEPM) administrator ...
Question 6: Refer to the exhibit. (Exhibit) The status of two clients on...
Question 7: An administrator needs to exclude some servers from an Intru...
Question 8: A Symantec Endpoint Protection (SEP) administrator is remote...
Question 9: Which two considerations must an administrator make when ena...
1 commentQuestion 10: An administrator wants to deploy the Symantec Endpoint Prote...
Question 11: A Symantec Endpoint Protection 12.1 administrator has the Vi...
Question 12: The Symantec Endpoint Protection 12.1 (SEP) client indicates...
Question 13: What are two responsibilities associated with the Limited Ad...
Question 14: In a management server list, Symantec Endpoint Protection Ma...
Question 15: A company receives a high number of reports from users that ...
Question 16: An administrator notices that the Symantec Endpoint Protecti...
Question 17: A managed service provider (MSP) is managing Symantec Endpoi...
Question 18: Which Intrusion Prevention feature is updated automatically?...
Question 19: In addition to adding exceptions directly into an Exceptions...
Question 20: An administrator reports that the Home, Monitors, and Report...
Question 21: Which two criteria can be used to determine hosts in a host ...
Question 22: What is a function of the Symantec Endpoint Protection clien...
Question 23: Which protection engine should be enabled to drop malicious ...
Question 24: A company has a firewall policy with a rule that allows all ...
Question 25: What is a supported migration path for Symantec Endpoint Pro...
Question 26: Which two items should an administrator enter in the License...
Question 27: Which Symantec Endpoint Protection 12.1 protection technolog...
Question 28: A company has deployed Symantec Endpoint Protection 12.1 in ...
Question 29: Which Symantec Endpoint Protection technology blocks a downl...
Question 30: Refer to the exhibit. (Exhibit) An administrator uses the se...
Question 31: A company recently purchased the Symantec Endpoint Protectio...
Question 32: Which port is used by default for replication between sites?...
Question 33: An administrator changes the Virus and Spyware Protection po...
Question 34: What are two supported Symantec Endpoint Protection Manager ...
Question 35: A system running Symantec Endpoint Protection is assigned to...
Question 36: A Symantec Endpoint Protection 12.1 client is running a user...
Question 37: A Symantec Endpoint Protection 12.1 (SEP) administrator susp...
Question 38: Which action must a Symantec Endpoint Protection administrat...
Question 39: An administrator set the remediation options for Security Ri...
Question 40: An administrator selects the Backup files before attempting ...
Question 41: A Microsoft SQL Server containing a Symantec Endpoint Protec...
Question 42: A company is concerned that its clients may be out-of-date a...
Question 43: An administrator defines the Active Directory settings in th...
Question 44: Which statement describes a difference between Virtual Image...
Question 45: An administrator configures the scan duration for a schedule...
Question 46: What is an appropriate use of a file fingerprint list?...
Question 47: What is a function of Symantec Insight?...
Question 48: Which action does SONAR take before convicting a process?...
Question 49: What is the likely impact of increasing the Download Insight...
Question 50: When can an administrator add a new replication partner?...
Question 51: A user is unknowingly about to connect to a malicious websit...
Question 52: Which Symantec Endpoint Protection Management (SEPM) databas...
Question 53: Which two options can administrators customize on the Home p...
Question 54: Which Symantec Endpoint Protection 12.1 component provides s...
Question 55: The Security Status on the console home page is failing to a...
Question 56: What does SONAR use to reduce false positives?...
Question 57: Which two criteria can be used to determine hosts in a host ...
Question 58: In which two situations would Symantec Endpoint Protection 1...
Question 59: Why does Power Eraser need Internet access?...
Question 60: Where is a file encrypted and saved to when the "Backup file...
Question 61: A Symantec Endpoint Protection administrator is using System...
Question 62: Which notification action can be performed when a security-r...
Question 63: Which two are policy types within the Symantec Endpoint Prot...
Question 64: Which action can an administrator take to improve the Symant...
Question 65: An administrator is using the SylinkDrop tool to update a Sy...
Question 66: An administrator receives a browser certificate warning when...
Question 67: Refer to the exhibit. (Exhibit) A company has created a spec...
Question 68: An administrator is in the process of recovering from a disa...
Question 69: A large software company has a small engineering department ...
Question 70: A company has a single datacenter at its main office and 10 ...
Question 71: A Symantec Endpoint Protection administrator needs to comply...
Question 72: Refer to the exhibit. (Exhibit) An administrator has configu...
Question 73: A managed Symantec Endpoint Protection 12.1 (SEP) client is ...
Question 74: According to Symantec best practices, which two tasks should...
Question 75: Which two criteria should an administrator use when defining...
Question 76: Which Symantec Endpoint Protection 12.1 feature allows an ad...
Question 77: Refer to the exhibit. (Exhibit) A user runs a full scan on a...
Question 78: Which two are optional when replicating between Symantec End...
Question 79: A computer is configured in Mixed Control mode. The administ...
Question 80: An administrator enables the "Learn applications that run on...
Question 81: A company allows users to create firewall rules. During the ...
Question 82: In which client management log can an administrator identify...
Question 83: A Symantec Endpoint Protection 12.1 group has two defined lo...
Question 84: What is a valid Symantec Endpoint Protection (SEP) single si...
Question 85: Which two instances could cause Symantec Endpoint Protection...
Question 86: A Symantec Endpoint Protection administrator needs to preven...
Question 87: Which option is unavailable in the Symantec Endpoint Protect...
Question 88: What is the first step an administrator should take in order...
Question 89: A company wants its clients to use the Group Update Provider...
Question 90: An administrator is logged in to the Symantec Endpoint Prote...
Question 91: An administrator is recovering from a Symantec Endpoint Mana...
Question 92: Which Symantec Endpoint Protection client component must be ...
Question 93: Which step must be completed to set up two sites to replicat...
Question 94: According to Symantec, what is a botnet?...
Question 95: Which technology uses heuristics to scan outbound email?...
Question 96: An administrator needs to ensure that a specific network thr...
Question 97: Administrators at a company share a single terminal for conf...
Question 98: Which two sources can a Macintosh client use to download con...
Question 99: Which action does the Shared Insight Cache (SIC) server take...
Question 100: Which setting can an administrator configure in the LiveUpda...
Question 101: A Symantec Endpoint Protection Manager (SEPM) administrator ...
Question 102: A company is experiencing a malware outbreak. The company de...
Question 103: A company needs to configure an Application and Device Contr...
Question 104: Which Symantec Endpoint Protection 12.1 component improves p...
Question 105: A clean file in a proprietary application has been quarantin...
Question 106: A company is transitioning from using policies based on the ...
Question 107: A Symantec Endpoint Protection administrator must block traf...
Question 108: A company creates free web access computers for use in publi...
Question 109: Which feature can be configured to increase or decrease perf...
Question 110: How can an administrator manage multiple, independent compan...
Question 111: In Symantec Endpoint Protection 12.1 Enterprise Edition (SEP...
Question 112: A financial company enforces a security policy that prevents...
Question 113: In addition to performance improvements, which two benefits ...
Question 114: An administrator enabled virtual image exceptions for Auto-P...
Question 115: Which two Symantec Endpoint Protection components are used t...
Question 116: What could be an adverse effect of activating aggressive mod...
Question 117: A company is deploying Symantec Endpoint Protection 12.1 and...
Question 118: An administrator wants to ensure that all clients consider t...
Question 119: A new installation of the Symantec Endpoint Protection 12.1 ...
Question 120: An exception needs to be created for a file named "RunMe.exe...
Question 121: Which two Symantec Endpoint Protection 12.1 (SEP) standalone...
Question 122: Which protection technology can detect botnet command and co...
Question 123: A large oil company has a small exploration department that ...
Question 124: An administrator needs to determine which versions of Symant...
Question 125: A company selected Opera 10 as its corporate browser. Drive-...
Question 126: A company is building a new Symantec Endpoint Protection Man...
Question 127: An administrator notices that some entries list that the Ris...
Question 128: Which component is required in order to run Symantec Endpoin...
Question 129: A company organizes its clients into two groups, the Symante...
Question 130: A client is unable to communicate with the Symantec Endpoint...
Question 131: Which Symantec Endpoint Protection component enables access ...
Question 132: A company wants to reduce or eliminate the HelpDesk calls th...
Question 133: After several failed logon attempts, the Symantec Endpoint P...
Question 134: An administrator needs to check when and by which account a ...
Question 135: Which operation can be performed using the Database Back Up ...
Question 136: An administrator is modifying a Virus and Spyware Protection...
Question 137: An administrator needs to configure Secure Socket Layer (SSL...
Question 138: A large-scale virus attack is occurring and a notification c...
Question 139: Multiple Windows virtual clients running on an ESX server ne...
Question 140: An administrator uses ClientSideClonePrepTool to clone syste...
Question 141: Where in the Symantec Endpoint Protection (SEP) management c...
Question 142: Which Symantec Endpoint Protection 12.1 component uses reput...
Question 143: Which Symantec Endpoint Protection defense mechanism provide...
Question 144: An administrator enabled the default application control rul...
Question 145: A large set of static PDF files stored on a single virtual c...
Question 146: Drive-by downloads are a common vector of infections. Some o...
Question 147: Which two configuration elements are needed in order to add ...
Question 148: A large enterprise plans to deploy Symantec Endpoint Protect...
Question 149: An administrator is re-adding an existing Replication Partne...
Question 150: A company plans to install six Symantec Endpoint Protection ...
Question 151: A system administrator created a firewall policy that allows...
Question 152: Which action should an administrator take to prevent users f...
Question 153: A company plans to expand its Symantec Endpoint Protection 1...
Question 154: An administrator is troubleshooting a Symantec Endpoint Prot...
Question 155: A company is setting up a new environment with three Symante...
Question 156: You have just started a relayout operation in a live test en...
Question 157: What are two criteria that Symantec Insight uses to evaluate...
Question 158: An organization employs laptop users who travel frequently. ...
Question 159: An administrator is designing a new single site Symantec End...
Question 160: An administrator creates a new domain in the Symantec Endpoi...
Question 161: What is the default replication frequency when adding an add...
Question 162: Refer to the exhibit. (Exhibit) Which settings can impact th...
Question 163: A Symantec Endpoint Protection (SEP) client uses a managemen...
Question 164: An administrator has installed Symantec Endpoint Protection ...
Question 165: A Symantec Endpoint Protection 12.1 (SEP) administrator is r...
Question 166: A company needs to prevent users from modifying files in a s...
Question 167: An employee is taking leave for four months and the employee...
Question 168: Which command line syntax invokes the Symantec Endpoint Prot...
Question 169: A financial company has a security policy that prevents bank...
Question 170: Which two should be considered when enabling Application Lea...
Question 171: Which command attempts to find the name of the drive in the ...
Question 172: Which ports on the company firewall must an administrator op...
Question 173: In which two areas can host groups be used? (Select two.)...
Question 174: For replication, Symantec recommends that the number of site...
Question 175: A company suffered a catastrophic hardware failure on the Sy...
Question 176: A Symantec Endpoint Protection (SEP) administrator creates a...
Question 177: Which Symantec Endpoint Protection 12.1 defense mechanism pr...
Question 178: Users report abnormal behavior on systems where Symantec End...
Question 179: (Exhibit) An administrator defines the Active Directory sett...
Question 180: How can an administrator proactively obtain information abou...
Question 181: How are Insight results stored?...
Question 182: A Symantec Endpoint Protection (SEP) administrator performed...
Question 183: A user added a daily 10:00 scheduled scan to their Symantec ...
Question 184: An administrator is reviewing risk logs in the Symantec Endp...
Question 185: An administrator needs to increase the access speed for clie...
Question 186: Which type of email does Internet Email Auto-Protect support...
Question 187: A manufacturing company runs three shifts. Employees at the ...
Question 188: Which client log shows that a client is downloading content ...
Question 189: An administrator wants to make sure users are warned when th...
Question 190: Which setting can an administrator change that will result i...
Question 191: What is a characteristic of a Symantec Endpoint Protection (...
Question 192: How frequently does Symantec recommend that a Symantec Endpo...
Question 193: Which Symantec Endpoint Protection 12.1 component provides s...
Question 194: How can a Symantec Endpoint Protection 12.1 client on a Maci...
Question 195: Refer to the exhibit. (Exhibit) What does the symbol to the ...
Question 196: A company is building a new Symantec Endpoint Protection Man...
Question 197: A company is running the Symantec Endpoint Protection 12.1 f...
Question 198: When the Symantec Endpoint Protection 12.1 client firewall d...
Question 199: An administrator has defined a rule to allow traffic to and ...
Question 200: Which authentication method must be used to provide the abil...
Question 201: By default, the Client User Interface control is set to Serv...
Question 202: A threat was detected by Auto-Protect on a client system. Wh...
Question 203: In the virus and Spyware Protection policy, an administrator...
Question 204: An administrator makes a change in the Active Directory stru...
Question 205: Which object in the Symantec Endpoint Protection Manager con...
Question 206: Where can an administrator obtain the Sylink.xml file?...
Question 207: Which statement is true about the Database Backup and Restor...
Question 208: An administrator needs to add an Application Exception. When...
Question 209: Some customers report that when they run the command "smc -s...
Question 210: In Symantec Endpoint Protection 12.1 Enterprise Edition, wha...
Question 211: Acrobat Reader is being targeted by a threat using process i...
Question 212: A Symantec Endpoint Protection 12.1 (SEP) administrator disc...
Question 213: A company has a small number of systems in their Symantec En...
Question 214: A company has an application that requires network traffic i...
Question 215: The fake antivirus family "PC scout" infects systems with a ...
Question 216: The LiveUpdate Download Schedule is set to the default on th...
Question 217: A company deploys Symantec Endpoint Protection client to its...
Question 218: An administrator is responsible for the Symantec Endpoint Pr...
Question 219: Which Symantec Endpoint Protection Manager feature allows an...
Question 220: Which two options are available when configuring high risk d...
Question 221: Which technology does the Symantec Endpoint Protection Firew...
Question 222: A large software company runs a small engineering department...
Question 223: Which exception type can be configured?...
Question 224: An administrator is restoring a Microsoft SQL Symantec Endpo...
Question 225: How many Symantec Endpoint Protection Managers can connect t...
Question 226: Refer to the exhibit. (Exhibit) Inheritance is turned on onl...
Question 227: Which step is unnecessary when an administrator creates an a...
Question 228: Which task should an administrator perform to troubleshoot o...
Question 229: An administrator plans to implement a multi-site Symantec En...
Question 230: Which policy should an administrator modify to enable Virtua...
Question 231: Which two criteria can an administrator use to determine hos...
Question 232: What are two default access rights for various types of Syma...
Question 233: A Symantec Endpoint Protection (SEP) administrator receives ...
Question 234: A user is downloading a file from https://www.example.com to...
Question 235: A company has three groups of clients: Laptops, Desktops, an...
Question 236: A Symantec Endpoint Protection 12.1 (SEP) administrator depl...
Question 237: Company A acquires Company B. Company B has 200 employees. M...
Question 238: An administrator is reviewing an Infected Clients Report and...
Question 239: Which tool should an administrator use to discover and deplo...
Question 240: Refer to the exhibit. (Exhibit) A company is using a custom ...
Question 241: An administrator needs to customize the Application and Devi...
Question 242: A LiveUpdate policy allows for configuring single Group Upda...
Question 243: Where are directory servers added before importing Organizat...
Question 244: Which task is unavailable for administrative accounts that a...
Question 245: A company deploys Symantec Endpoint Protection (SEP) to 50 v...
Question 246: A company suffered catastrophic hardware failure on the Syma...
Question 247: What is the file scan workflow order when Shared Insight Cac...
Question 248: Which tool should the administrator run before starting the ...
Question 249: Which two actions can a user take during an in-progress sche...
Question 250: An administrator gets a browser certificate warning when acc...