What is a function of Symantec Insight?
A. provides reputation ratings for structured data
B. enhances the capability of Group Update Providers (GUP)
C. increases the efficiency and effectiveness of LiveUpdate
D. provides reputation ratings for binary executables
Which task should an administrator perform to troubleshoot operation of the Symantec Endpoint Protection embedded database?
A. verify that dbsrv11.exe is listening on port 2638
B. check whether the MSSQLSERVER service is running
C. verify the sqlserver.exe service is running on port 1433
D. check the database transaction logs in X\Program Files\Microsoft SQL server
What is a function of the Symantec Endpoint Protection client?
A. uploads logs to the Shared Insight Cache
B. sends and receives application reputation ratings from LiveUpdate
C. downloads virus content updates from Symantec Insight
D. provides a Lotus Notes email scanner
Which two are policy types within the Symantec Endpoint Protection Manager? (Select two.)
A. Exceptions
B. Host Protection
C. Shared Insight
D. Intrusion Prevention
E. Process Control
Which systems can be identified for deployment using the Find Computers option when using the Client Deployment Wizard?
A. Mac OS
B. Linux
C. Windows 2000
D. Windows 2008 - 64bit OS
Where in the Symantec Endpoint Protection (SEP) management console will a SEP administrator find the option to allow all users to enable and disable the client firewall?
A. Client User Interface Control Settings
B. Overview in Firewall Policy
C. Settings in Intrusion Prevention Polic
D. System Lockdown in Group Policy
A Symantec Endpoint Protection (SEP) client uses a management server list with three management servers in the priority 1 list. Which mechanism does the SEP client use to select an alternate management server if the currently selected management server is unavailable?
A. The client chooses another server in the list randomly.
B. The client chooses a server based on the lowest server load.
C. The client chooses a server with the next highest IP address.
D. The client chooses the next server alphabetically by server name.
What are two criteria that Symantec Insight uses to evaluate binary executables? (Select two.)
A. sensitivity
B. prevalence
C. confidentiality
D. content
E. age
Which action must a Symantec Endpoint Protection administrator take before creating custom Intrusion Prevention signatures?
A. change the custom signature order
B. create a Custom Intrusion Prevention Signature library
C. define signature variables
D. enable signature logging
A Microsoft SQL Server containing a Symantec Endpoint Protection Manager (SEPM) database has encountered an unrecoverable hard drive failure. An administrator has rebuilt the Microsoft SQL Server and has confirmed that the SEPM can connect with the SQL Server. Which step should the administrator take next?
A. Select Rebuild Indexes from the SEPM console
B. Launch Checksum.exe database integrity tool
C. Use the Backup and Restore utility included with SEPM
D. Select Truncate Transaction Logs from the SEPM