Summer Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

250-561 Sample Questions Answers

Questions 4

What happens when an administrator blacklists a file?

Options:

A.

The file is assigned to the Blacklist task list

B.

The file is automatically quarantined

C.

The file is assigned to a chosen Blacklist policy

D.

The file is assigned to the default Blacklist policy

Buy Now
Questions 5

Which two (2) options is an administrator able to use to prevent a file from being fasely detected (Select two)

Options:

A.

Assign the file a SHA-256 cryptographic hash

B.

Add the file to a Whitelist policy

C.

Reduce the Intensive Protection setting of the Antimalware policy

D.

Register the file with Symantec's False Positive database

E.

Rename the file

Buy Now
Questions 6

Which type of security threat is used by attackers to exploit vulnerable applications?

Options:

A.

Lateral Movement

B.

Privilege Escalation

C.

Command and Control

D.

Credential Access

Buy Now
Questions 7

An administrator learns of a potentially malicious file and wants to proactively prevent the file from ever being executed.

What should the administrator do?

Options:

A.

Add the file SHA1 to a blacklist policy

B.

Increase the Antimalware policy Intensity to Level 5

C.

Add the filename and SHA-256 hash to a Blacklist policy

D.

Adjust the Antimalware policy age and prevalence settings

Buy Now
Questions 8

Which report template type should an administrator utilize to create a daily summary of network threats detected?

Options:

A.

Network Risk Report

B.

Blocked Threats Report

C.

Intrusion Prevention Report

D.

Access Violation Report

Buy Now
Questions 9

Which two (2) steps should an administrator take to guard against re-occurring threats? (Select two)

Options:

A.

Confirm that daily active and weekly full scans take place on all endpoints

B.

Verify that all endpoints receive scheduled Live-Update content

C.

Use Power Eraser to clean endpoint Windows registries

D.

Add endpoints to a high security group and assign a restrictive Antimalware policy to the group

E.

Quarantine affected endpoints

Buy Now
Questions 10

What is the primary issue pertaining to managing roaming users while utilizing an on-premise solution?

Options:

A.

The endpoint is missing timely policy update

B.

The endpoint is absent of the management console

C.

The endpoint fails to receive content update

D.

The endpoint is more exposed to threats

Buy Now
Questions 11

The ICDm has generated a blacklist task due to malicious traffic detection. Which SES component was utilized to make that detection?

Options:

A.

Antimalware

B.

Reputation

C.

Firewall

D.

IPS

Buy Now
Questions 12

In the ICDm, administrators are assisted by the My Task view. Which automation type creates the tasks within the console?

Options:

A.

Artificial Intelligence

B.

Machine Learning

C.

Advanced Machine Learning

D.

Administrator defined rules

Buy Now
Questions 13

Which device page should an administrator view to track the progress of an issued device command?

Options:

A.

Command Status

B.

Command History

C.

Recent Activity

D.

Activity Update

Buy Now
Questions 14

Which Firewall Stealth setting prevents OS fingerprinting by sending erroneous OS information back to the attacker?

Options:

A.

Disable OS fingerprint profiling

B.

Disable OS fingerprint detection

C.

Enable OS fingerprint masqueradi

D.

Enable OS fingerprint protection

Buy Now
Questions 15

Which file should an administrator create, resulting Group Policy Object (GPO)?

Options:

A.

Symantec__Agent_package_x64.zip

B.

Symantec__Agent_package_x64.msi

C.

Symantec__Agent_package__32-bit.msi

D.

Symantec__Agent_package_x64.exe

Buy Now
Questions 16

Which alert rule category includes events that are generated about the cloud console?

Options:

A.

Security

B.

Diagnostic

C.

System

D.

Application Activity

Buy Now
Questions 17

Which type of organization is likely to be targeted with emerging threats?

Options:

A.

Small organization with externalized managed security

B.

Large organizations with dedicated security teams

C.

Large organization with high turnover

D.

Small organization with little qualified staff

Buy Now
Questions 18

An administrator is evaluating an organization's computers for an upcoming SES deployment. Which computer meets the pre-requisites for the SES client?

Options:

A.

A computer running Mac OS X 10.8 with 500 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processor

B.

A computer running Mac OS X 10.14 with 400 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processor

C.

A computer running Windows 10 with 400 MB of disk space, 2 GB of RAM, and a 2.4 GHz Intel Pentium 4 processor

D.

A computer running Windows 8 with 380 MB of disk space, 2 GB of RAM, and a 2.8 GHz Intel Pentium 4 processor

Buy Now
Questions 19

Which option should an administrator utilize to temporarily or permanently block a file?

Options:

A.

Delete

B.

Hide

C.

Encrypt

D.

Blacklist

Buy Now
Questions 20

What are two (2) benefits of a fully cloud managed endpoint protection solution? (Select two)

Options:

A.

Increased content update frequency

B.

Increased visibility

C.

Reduced 3rd party licensing cost

D.

Reduced database usage

E.

Reduced network usage

Buy Now
Questions 21

What should an administrator know regarding the differences between a Domain and a Tenant in ICDm?

Options:

A.

A tenant can contain multiple domains

B.

A domain can contain multiple tenants

C.

Each customer can have one domain and many tenant

D.

Each customer can have one tenant and many domains

Buy Now
Exam Code: 250-561
Exam Name: Endpoint Security Complete - Administration R1
Last Update: Jun 20, 2024
Questions: 70
$64  $159.99
$48  $119.99
$40  $99.99
buy now 250-561