Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Certification
Study Set
Symantec
Exam 2: Administration of Symantec Email Security.cloud (v1)
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 81
Multiple Choice
An organization created a rule in the Application and Device Control policy to block peer-to-peer applications. What two other protection technologies can block and log such unauthorized application? (Choose two.)
Question 82
Multiple Choice
What type of exceptions can an administrator create from the Symantec Endpoint Protection Manager for a Mac client?
Question 83
Multiple Choice
An organization has four locations setup in their Symantec Endpoint Protection Environment to match the physical sites they have - NAM, LATAM, EMEA, and APAC. When users travel from site to site, they would like to control which SEPM a client connects to based on the client's proximity to the nearest SEPM server. The location is triggered by IP range assigned by the DHCP of that site. How can the organization utilize Locations to control which SEPM or set of SEPMs the clients connect to?
Question 84
Multiple Choice
Which content distribution method can distribute content to all client types and provides validation scheduling?
Question 85
Multiple Choice
What two steps should an administrator take to troubleshoot firewall processing with the Symantec Endpoint Protection client? (Choose two.)
Question 86
Multiple Choice
An organization's Limited Administrator needs to create an exclusion. When the Limited Administrator logs in, they do NOT see Exceptions listed as an option on the Policies page. What setting should a System Administrator enable so the Limited Administrator could see Exceptions and create an exclusion?
Question 87
Multiple Choice
An organization has several Symantec Endpoint Protection Management (SEPM) Servers without access to the Internet. The SEPM can only run LiveUpdate within a specified "maintenance window" outside of business hours. What content distribution method should the organization utilize?
Question 88
Multiple Choice
Where does an administrator review logs, after enabling debug logging for client communication on a SEP for Mac client?
Question 89
Multiple Choice
An organization recently experienced an outbreak involving a threat that replicated over network shares. The SEP Administrator needs to heuristically scan file operations that target network drives. What options should an administrator enable in the Virus and Spyware Protection policy?
Question 90
Multiple Choice
An organization needs to be notified when certain types of events happen in their SEP environment. What notification type should the SEP Administrator create to see attacks and events that the firewall or Intrusion Protection System (IPS) detects?
Question 91
Multiple Choice
What are two methods the SEP Administrator can use for gathering a fingerprint list? (Choose two.)
Question 92
Multiple Choice
What type of client remediation can an administrator perform in the SEPM with events in the Attack logs?
Question 93
Multiple Choice
An organization needs to ensure that SEP detects a malicious or potentially malicious file when downloaded via a text messaging client. What feature can an organization enable in the Virus and Spyware Protection policy and modify its sensitivity settings?
Question 94
Multiple Choice
How should an administrator set up an alert to be notified when manual remediation is needed on an endpoint?
Question 95
Multiple Choice
What SEPM report should an administrator utilize to view the files that Download Insight detected on your computers, after configuring Download Insight?
Question 96
Multiple Choice
An organization has a small group of servers with large drive volumes. What setting in the Virus and Spyware Protection policy can the organization utilize when scheduling scans on these servers?