An organization created a rule in the Application and Device Control policy to block peer-to-peer applications. What two other protection technologies can block and log such unauthorized application? (Choose two.)
A) Memory Exploit Mitigation
B) Virus and Spyware Protection
C) Custom IPS Signatures
D) Host Integrity
E) Firewall
Correct Answer:
Verified
Q76: A financial company enforces a security policy
Q77: Which package type should an administrator use
Q78: Which protection technology can detect botnet command
Q79: A Symantec Endpoint Protection (SEP) administrator performed
Q80: An administrator is recovering from a Symantec
Q82: What type of exceptions can an administrator
Q83: An organization has four locations setup in
Q84: Which content distribution method can distribute content
Q85: What two steps should an administrator take
Q86: An organization's Limited Administrator needs to create
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents