Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

Symantec 250-550 Endpoint Security Complete - Administration R1 Exam Practice Test

Demo: 10 questions
Total 1 questions

Endpoint Security Complete - Administration R1 Questions and Answers

Question 1

An endpoint fails to retrieve content updates.

Which URL should an administrator test in a browser to determine if the issue is network related?

Options:

A.

https://liveupdate.symantec,com/livetri.zi

B.

http://update.symantec.com/livetri.zip

C.

https://spocsymantec.com/livetri.zip

D.

https://update.symantec.com/livetri.zip

Question 2

An administrator learns of a potentially malicious file and wants to proactively prevent the file from ever being executed.

What should the administrator do?

Options:

A.

Add the file SHA1 to a blacklist policy

B.

Increase the Antimalware policy Intensity to Level 5

C.

Add the filename and SHA-256 hash to a Blacklist policy

D.

Adjust the Antimalware policy age and prevalence settings

Question 3

Which SES advanced feature detects malware by consulting a training model composed of known good and known bad fries?

Options:

A.

Signatures

B.

Advanced Machine Learning

C.

Reputation

D.

Artificial Intelligence

Question 4

What is the primary issue pertaining to managing roaming users while utilizing an on-premise solution?

Options:

A.

The endpoint is missing timely policy update

B.

The endpoint is absent of the management console

C.

The endpoint fails to receive content update

D.

The endpoint is more exposed to threats

Question 5

Which two (2) options is an administrator able to use to prevent a file from being fasely detected (Select two)

Options:

A.

Assign the file a SHA-256 cryptographic hash

B.

Add the file to a Whitelist policy

C.

Reduce the Intensive Protection setting of the Antimalware policy

D.

Register the file with Symantec's False Positive database

E.

Rename the file

Question 6

Which framework, open and available to any administrator, is utilized to categorize adversarial tactics and for each phase of a cyber attack?

Options:

A.

MITRE RESPONSE

B.

MITRE ATT&CK

C.

MITRE ADV&NCE

D.

MITRE ATTACK MATRIX

Question 7

Which report template out format should an administrator utilize to generate graphical reports?

Options:

A.

XML

B.

HTML

C.

PFD

D.

XML

Question 8

Which URL is responsible for notifying the SES agent that a policy change occurred in the cloud console?

Options:

A.

spoc.norton.com

B.

stnd-ipsg.crsi-symantec.com

C.

ent-shasta.rrs-symantec.com

D.

ocsp.digicert.com

Question 9

An administrator suspects that several computers have become part of a botnet. What should the administrator do to detect botnet activity on the network?

Options:

A.

Enable the Command and Control Server Firewall

B.

Add botnet related signatures to the IPS policy's Audit Signatures list

C.

Enable the IPS policy's Show notification on the device setting

D.

Set the Antimalware policy's Monitoring Level to 4

Question 10

In which phase of MITRE framework would attackers exploit faults in software to directly tamper with system memory?

Options:

A.

Exfiltration

B.

Discovery

C.

Execution

D.

Defense Evasion

Demo: 10 questions
Total 1 questions