The LiveUpdate Download Schedule is set to the default on the Symantec Endpoint Protection Manager (SEPM).
How many content revisions must the SEPM keep to ensure clients that check in to the SEPM every 10 days receive xdelta content packages instead of full content packages?
In what order should an administrator configure the integration between SEDR and Symantec Endpoint Protection in order to maximize their benefits?
Using a hybrid environment, if a SEPM-managed endpoint cannot connect to the SEPM, how quickly can an administrator receive a security alert if the endpoint is using a public hot-spot?
What feature is used to get a comprehensive picture of infected endpoint activity?
What does the Endpoint Communication Channel (ECC) 2.0 allow Symantec EDR to directly connect to?
Administrators at a company share a single terminal for configuring Symantec Endpoint Protection. The administrators want to ensure that each administrator using the console is forced to authenticate using their individual credentials. They are concerned that administrators may forget to log off the terminal, which would easily allow others to gain access to the Symantec Endpoint Protection Manager (SEPM) console.
Which setting should the administrator disable to minimize the risk of non-authorized users logging into the SEPM console?
Which statement demonstrates how Symantec EDR hunts and detects IoCs in the environment?
An Application Control policy includes an Allowed list and a Blocked list. A user wants to use an application that is neither on the Allowed list nor on the Blocked list. What can the user do to gain access to the application?
Which Incident View widget shows the parent-child relationship of related security events?
What account type must the AD Gateway Service Account be assigned to the AD Gateway device for AD Synchronization to function correctly?
Which alert rule category includes events that are generated about the cloud console?
Which client log shows that a client is downloading content from its designated source?
In the virus and Spyware Protection policy, an administrator sets the First action to Clean risk and sets If first action fails to Delete risk. Which two (2) factors should the administrator consider? (Select two.)
Which SES feature helps administrators apply policies based on specific endpoint profiles?
What are the two (2) locations where an Incident Responder should gather data for an After Actions Report in SEDR? (Select two)
Which Indicator of Compromise might be detected as variations in the behavior of privileged users that indicate that their account is being used by someone else to gain a foothold in an environment?
The LiveUpdate Download Schedule is set to the default on the Symantec Endpoint Protection Manager (SEPM).
How many content revisions must the SEPM keep to ensure clients that check in to the SEPM every 10 days receive xdelta content packages instead of full content packages?
What protection technology should an administrator enable to prevent double executable file names of ransomware variants like Cryptolocker from running?
How would an administrator specify which remote consoles and servers have access to the management server?
In the virus and Spyware Protection policy, an administrator sets the First action to Clean risk and sets If first action fails to Delete risk. Which two (2) factors should the administrator consider? (Select two.)
What EDR function minimizes the risk of an endpoint infecting other resources in the environment?
Which technology can prevent an unknown executable from being downloaded through a browser session?
Which designation should an administrator assign to the computer configured to find unmanaged devices?
Which report template type should an administrator utilize to create a daily summary of network threats detected?
Which action must a Symantec Endpoint Protection administrator take before creating custom Intrusion Prevention signatures?
Which rule types should be at the bottom of the list when an administrator adds device control rules?
Which Firewall rule components should an administrator configure to blockfacebook.comuse during business hours?
What type of policy provides a second layer of defense, after the Symantec firewall?
A user is unknowingly about to connect to a malicious website and download a known threat within a .rar file. All Symantec Endpoint Protection technologies are installed on the client's system.
In which feature set order must the threat pass through to successfully infect the system?
Which Endpoint Setting should an administrator utilize to locate unmanaged endpoints on a network subnet?