Which SES feature helps administrators apply policies based on specific endpoint profiles?
Which type of security threat is used by attackers to exploit vulnerable applications?
Which designation should an administrator assign to the computer configured to find unmanaged devices?
Administrators at a company share a single terminal for configuring Symantec Endpoint Protection. The administrators want to ensure that each administrator using the console is forced to authenticate using their individual credentials. They are concerned that administrators may forget to log off the terminal, which would easily allow others to gain access to the Symantec Endpoint Protection Manager (SEPM) console.
Which setting should the administrator disable to minimize the risk of non-authorized users logging into the SEPM console?
Which rule types should be at the bottom of the list when an administrator adds device control rules?
Which action can an administrator take to improve the Symantec Endpoint Protection Manager (SEPM) dashboard performance and report accuracy?
What is the purpose of a Threat Defense for Active Directory Deceptive Account?
An Application Control policy includes an Allowed list and a Blocked list. A user wants to use an application that is neither on the Allowed list nor on the Blocked list. What can the user do to gain access to the application?
Which designation should an administrator assign to the computer configured to find unmanaged devices?
What priority would an incident that may have an impact on business be considered?
An organization recently experienced an outbreak and is conducting a health check of the environment. What Protection Technology can the SEP team enable to control and monitor the behavior of applications?
How should an administrator set up an alert to be notified when manual remediation is needed on an endpoint?
In the virus and Spyware Protection policy, an administrator sets the First action to Clean risk and sets If first action fails to Delete risk. Which two (2) factors should the administrator consider? (Select two.)
In the virus and Spyware Protection policy, an administrator sets the First action to Clean risk and sets If first action fails to Delete risk. Which two (2) factors should the administrator consider? (Select two.)
Which term or expression is utilized when adversaries leverage existing tools in the environment?
A file has been identified as malicious.
Which feature of SEDR allows an administrator to manually block a specific file hash?
Which action must a Symantec Endpoint Protection administrator take before creating custom Intrusion Prevention signatures?
The LiveUpdate Download Schedule is set to the default on the Symantec Endpoint Protection Manager (SEPM).
How many content revisions must the SEPM keep to ensure clients that check in to the SEPM every 10 days receive xdelta content packages instead of full content packages?
What Threat Defense for Active Directory feature disables a process's ability to spawn another process, overwrite a part of memory, run recon commands, or communicate to the network?
What type of policy provides a second layer of defense, after the Symantec firewall?
Which Symantec Endpoint Protection technology blocks a downloaded program from installing browser plugins?
Which alert rule category includes events that are generated about the cloud console?
In what order should an administrator configure the integration between SEDR and Symantec Endpoint Protection in order to maximize their benefits?
The SES Intrusion Prevention System has blocked an intruder's attempt to establish an IRC connection inside the firewall. Which Advanced Firewall Protection setting should an administrator enable to prevent the intruder's system from communicating with the network after the IPS detection?
What protection technologies should an administrator enable to protect against Ransomware attacks?
Which other items may be deleted when deleting a malicious file from an endpoint?
An administrator notices that some entries list that the Risk was partially removed. The administrator needs to determine whether additional steps are necessary to remediate the threat.
Where in the Symantec Endpoint Protection Manager console can the administrator find additional information on the risk?
Which IPS signature type is primarily used to identify specific unwanted network traffic?
What EDR function minimizes the risk of an endpoint infecting other resources in the environment?
Which statement demonstrates how Symantec EDR hunts and detects IoCs in the environment?
What type of condition must be included in a custom incident rule in order for it to be valid?
An organization identifies a threat in its environment and needs to limit the spread of the threat. How should the SEP Administrator block the threat using Application and Device Control?
What does the Endpoint Communication Channel (ECC) 2.0 allow Symantec EDR to directly connect to?
If an administrator enables the setting to manage policies from the cloud, what steps must be taken to reverse this process?
An Incident Responder has determined that an endpoint is compromised by a malicious threat. What SEDR feature would be utilized first to contain the threat?