The Security Status on the console home page is failing to alert a Symantec Endpoint Protection (SEP) administrator when virus definitions are out of date.
How should the SEP administrator enable the Security Status alert?
A. Lower the Security Status thresholds
B. Raise the Security Status thresholds
C. Change the Notifications setting to “Show all notifications”
D. Change the Action Summary display to “By number of computers”
An administrator is designing a new single site Symantec Endpoint Protection environment. Due to perimeter firewall bandwidth restrictions, the design needs to minimize the amount of traffic from content passing through the firewall.
Which source must the administrator avoid using?
A. Symantec Endpoint Protection Manager
B. LiveUpdate Administrator (LUA)
C. Group Update Provider (GUP)
D. Shared Insight Cache (SIC)
After several failed logon attempts, the Symantec Endpoint Protection Manager (SFPM) has locked the default admin account. An administrator needs to make system changes as soon as possible to address an outbreak, but the admin account is the only account.
Which action should the administrator lake to correct the problem with minimal impact to the existing environment?
A. Wait 15 minutes and attempt to log on again
B. Restore the SEPM from a backup
C. Run the Management Server and Configuration Wizard to reconfigure the server
D. Reinstall the SEPM
A company deploys Symantec Endpoint Protection (SEP) to 50 virtual machines running on a single ESXi host.
Which configuration change can the administrator make to minimize sudden IOPS impact on the ESXi server while each SEP endpoint communicates with the Symantec Endpoint Protection Manager?
A. increase Download Insight sensitivity level
B. reduce the heartbeat interval
C. increase download randomization window
D. reduce number of content revisions to keep
Which Symantec Endpoint Protection defense mechanism provides protection against threats that propagate from system to system through the use of autotun.inf files?
A. Host Integrity
B. SONAR
C. Application and Device Control
D. Emulator
Which two are policy types within the Symantec Endpoint Protection Manager? (Select two.)
A. Exceptions
B. Host Protection
C. Shared Insight
D. Intrusion Prevention
E. Process Control
How should an administrator set up an alert to be notified when manual remediation is needed on an endpoint?
A. Add a System event notification and specify "Left Alone" for the action taken. Choose to log the notification and send an e-mail to the system administrators
B. Add a Single Risk Event notification and specify "Left Alone" for the action taken. Choose to log the notification and send an e-mail to the system administrators
C. Add a New risk detected notification and specify "Left Alone" for the action taken. Choose to log the notification and send an e-mail to the system administrators
D. Add a Client security alert notification and specify "Left Alone" for the action taken. Choose to log the notification and send an e-mail to the system administrators
An organization would like to control the policies that the client uses when connecting over VPN, but wants to use a different set of policies in the office. How should an administrator implement this?
A. Create a Location called VPN and a Group called Office. Allow the client to switch to the VPN location when the user is working remote.
B. Create a Group called VPN and a Location called Office. Allow the client to switch to the VPN location when the user is working remote.
C. Create a Location called VPN and a Location called Office. Allow the client to switch to the VPN location when the user is working remote.
D. Create a Group called VPN and a Group called Office. Move the client to the VPN group when the user is working remotely.
How often does Symantec recommend running full scans?
A. Once a week
B. Once a month
C. Everyday
D. Every two weeks
Solusell recently deployed SEP 14 in their environment and created the following groups for their computers: Desktops Laptops Servers
What type of group structure does Solusell use?
A. Role
B. Combination
C. Folder
D. Geography