What is the likely cause?

An administrator is unable to delete a location. What is the likely cause?A . The location currently contains clients.B . Criteria is defined within the location.C . The administrator has client control enabled.D . The location is currently assigned as the default location.View AnswerAnswer: D

September 16, 2020 No Comments READ MORE +

Which Symantec Endpoint Protection technology is ineffective on this company's workstations?

A financial company enforces a security policy that prevents banking system workstations from connecting to the Internet. Which Symantec Endpoint Protection technology is ineffective on this company's workstations?A . InsightB . Intrusion PreventionC . Network Threat ProtectionD . Browser Intrusion PreventionView AnswerAnswer: A

September 15, 2020 No Comments READ MORE +

Where can an administrator obtain the Sylink.xml file?

Where can an administrator obtain the Sylink.xml file?A . C:Program FilesSymantecSymantec Endpoint Protection folder on the clientB . C:Program FilesSymantecSymantec Endpoint ProtectionManagerdatainboxagent folder on the Symantec Endpoint Protection ManagerC . by selecting the client group and exporting the communication settings in the Symantec Endpoint Protection Manager ConsoleD . by selecting...

September 15, 2020 No Comments READ MORE +

Which technology can prevent an unknown executable from being downloaded through a browser session?

Which technology can prevent an unknown executable from being downloaded through a browser session?A . Browser Intrusion PreventionB . Download InsightC . Application ControlD . SONARView AnswerAnswer: B

September 15, 2020 No Comments READ MORE +

What must the administrator configure to use the two different policies?

Employees of an accounting company often take their notebooks to customer sites. The administrator needs to apply a different firewall policy when the notebooks are disconnected from the accounting company's network. What must the administrator configure to use the two different policies?A . GroupsB . DomainsC . SitesD . LocationsView...

September 14, 2020 No Comments READ MORE +

What are two supported Symantec Endpoint Protection Manager authentication types? (Select two.)

What are two supported Symantec Endpoint Protection Manager authentication types? (Select two.)A . Microsoft Active DirectoryB . MS-CHAPC . RSA SecurIDD . BiometricsE . Network Access ControlView AnswerAnswer: AC

September 14, 2020 No Comments READ MORE +

Which two items should an administrator enter in the License Activation Wizard to activate a license? (Select two.)

Which two items should an administrator enter in the License Activation Wizard to activate a license? (Select two.)A . password for the Symantec Licensing SiteB . purchase order numberC . serial numberD . Symantec License fileE . credit card numberView AnswerAnswer: CD

September 14, 2020 No Comments READ MORE +

Which two actions should the administrator take to direct replication activity to SEPM3 and SEPM4?

A company plans to install six Symantec Endpoint Protection Managers (SEPMs) spread evenly across two sites. The administrator needs to direct replication activity to SEPM3 server in Site 1 and SEPM4 in Site 2. Which two actions should the administrator take to direct replication activity to SEPM3 and SEPM4? (Select...

September 14, 2020 No Comments READ MORE +

What are two possible reasons for preventing installation?

A Symantec Endpoint Protection (SEP) administrator is remotely deploying SEP clients, but the clients are failing to install on Windows XP. What are two possible reasons for preventing installation? (Select two.)A . Windows firewall is enabled.B . Internet Connection firewall is disabled.C . Administrative file shares are enabled.D . Simple...

September 12, 2020 No Comments READ MORE +

How should the administrator architect this organization?

An administrator is responsible for the Symantec Endpoint Protection architecture of a large, multi-national company with three regionalized data centers. The administrator needs to collect data from clients; however, the collected data must stay in the local regional data center. Communication between the regional data centers is allowed 20 hours...

September 12, 2020 No Comments READ MORE +