Summer Sale - Limited Time 55% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 5763r953

Welcome To DumpsPedia

250-428 Sample Questions Answers

Questions 4

What two (2) steps should an administrator take to troubleshoot firewall with the Symantec Endpoint Protection client (Select two.)

Options:

A.

Disable the Symantec Endpoint Protection client and reproduce the issue.

B.

Add an "Allow AH" traffic rule to the assigned firewall policy and reproduce the issue.

C.

Create an exclusion in the Exceptions policy and reproduce the issue.

D.

Withdraw the assigned firewall policy and reproduce the issue.

E.

Enable TSE debug on the Symantec Endpoint Protect client and reproduce the issue.

Buy Now
Questions 5

What SEPM report should an administrator utilize to view the files that Download Insight detected on your computers, after configuring Download Insight?

Options:

A.

Risk Distribution

B.

SONAR Detection Results

C.

Risk Detections Count

D.

Download Risk Distribution

Buy Now
Questions 6

Which Symantec Endpoint Protection technology blocks a downloaded program from installing browser plugins?

Options:

A.

Intrusion Prevention

B.

SONAR

C.

Tamper Protection

D.

Application and Device Control

Buy Now
Questions 7

What optional Symantec Endpoint Protection component could an administrator utilize if an organization requires custom reports and queries?

Options:

A.

Q-Radar

B.

Splunk

C.

Crystal Reports

D.

IT Analytics

Buy Now
Questions 8

An administrator plans to implement a multi-site Symantec Endpoint Protection (SEP) deployment. The administrator needs to determine whether replication is viable without needing to make network firewall changes or change defaults in SEP.

Which port should the administrator verify is open on the path of communication between the two proposed sites?

Options:

A.

1433

B.

2967

C.

8014

D.

8443

Buy Now
Questions 9

Which two options are supported Symantec Endpoint Manager authentication types? (Select two.)

Options:

A.

Network Access Control

B.

Biometrics

C.

RSA SecurID

D.

MS-CHAP

E.

Microsoft Active Directory

Buy Now
Questions 10

Which two settings does an administrator enable to use the Risk Tracer Feature in the Virus and Spyware Protection policy? (Select two.)

Options:

A.

Firewall Policy

B.

Application and Device Control Policy

C.

Application Learning

D.

Tamper Protection

E.

IPS active response

Buy Now
Questions 11

A Symantec Endpoint Protection (SEP) client uses a management server list with three management servers in the priority 1 list.

Which mechanism does the SEP client use to select an alternate management server if the currently selected management server is unavailable?

Options:

A.

The client chooses the next server alphabetically by server name.

B.

The client chooses another server alphabetically in the list randomly.

C.

The client chooses a server with the next highest IP address.

D.

The client chooses a server based on the lowest server load.

Buy Now
Questions 12

A company needs to forward log data from Data Center A to Data Center B during off peak hours only.

How should the company architect its Symantec Endpoint Protection environment?

Options:

A.

Set up two sites and schedule replication between them during off peak hours

B.

Set up a single site and configure the clients to send their logs to the Manager during off peak hours

C.

Set up a Group Update Provider (GUP) at Data Center A and configure it to send logs during off peak hours

D.

Set up a LiveUpdate Server at Data Center A and configure it to send logs during off peak hours

Buy Now
Questions 13

Where in the Symantec Endpoint Protection (SEP) management console will a SEP administrator find the option to allow all users to enable and disable the client firewall?

Options:

A.

Client User Interface Control Settings

B.

Overview in Firewall Policy

C.

Settings in Intrusion Prevention Policy

D.

System Lockdown in Group Policy

Buy Now
Questions 14

What report should a SEP administrator utilize to verify that Clients are connected to the management server?

Options:

A.

Client Inventory

B.

Client Online Status

C.

Client Migration

D.

Audit report

Buy Now
Questions 15

Which action can an administrator take to improve the Symantec Endpoint Protection Manager (SEPM) dashboard performance and report accuracy?

Options:

A.

Rebuilding database indexes

B.

Lowering the client installation log entries

C.

Limiting the number of backups to keep

D.

Decreasing the number of content revisions to keep

Buy Now
Questions 16

An administrator needs to increase the access speed for client files that are stored on a file server.

Which configuration should the administrator review to address the read speed from the server?

Options:

A.

Enable Network Cache in the client’s Virus and Spyware Protection policy

B.

Add the applicable server to a trusted host group

C.

Enable download randomization in the client group’s communication settings

D.

Create a Firewall allow rule for the server’s IP address.

Buy Now
Questions 17

An administrator receives a browser certificate warning when accessing the Symantec Endpoint Protection Manager (SEPM) Web console.

Where can the administrator obtain the certificate?

Options:

A.

SEPM console Licenses section

B.

Admin > Servers > Configure SecureID Authentication

C.

SEPM console Admin Tasks

D.

SEPM Web Access

Buy Now
Questions 18

A Symantec Endpoint Protection (SEP) administrator is remotely deploying SEP clients, but the clients are failing to install on Windows XP.

What are two possible reasons for preventing installation? (Select two.)

Options:

A.

Windows firewall is enabled.

B.

Internet Connection firewall is disabled.

C.

Administrative file shares are enabled.

D.

Simple file sharing is enabled.

E.

Clients are configured for DHCP.

Buy Now
Questions 19

Which Symantec Endpoint Protection Management (SEPM) database option is the default for deployments of fewer than 1,000 clients?

Options:

A.

EmbeddeD. Using the Sybase SQL Anywhere database that comes with the product

B.

On SEPM: Installing Microsoft SQL on the same server as the SEPM

C.

External to SEPM: Using a preexisting Microsoft SQL server in the environment

D.

EmbeddeD. Using the Microsoft SQL database that comes with the product

Buy Now
Questions 20

Which option is a characteristic of a Symantec Endpoint Protection (SEP) domain?

Options:

A.

Every administrator from one domain can view data in other domains.

B.

Each domain has its own management server and database.

C.

Data for each domain is stored in its own separate SEP database.

D.

Domains share the same management server and database.

Buy Now
Exam Code: 250-428
Exam Name: Administration of Symantec Endpoint Protection 14
Last Update: Apr 15, 2024
Questions: 135
$72  $159.99
$54  $119.99
$45  $99.99
buy now 250-428