Which option is a characteristic of a Symantec Endpoint Protection (SEP) domain?

Which option is a characteristic of a Symantec Endpoint Protection (SEP) domain?
A . Every administrator from one domain can view data in other domains.
B . Each domain has its own management server and database.
C . Data for each domain is stored in its own separate SEP database.
D . Domains share the same management server and database.

Answer: D

Explanation:

References: https://support.symantec.com/en_US/article.HOWTO80764.html

Which task should an administrator perform to troubleshoot operation of the Symantec Endpoint Protection embedded database?

Which task should an administrator perform to troubleshoot operation of the Symantec Endpoint Protection embedded database?
A . Verify the sqlserver.exe service is running on port 1433
B . Verify that dbsrv11.exe is listening on port 2638
C . Check the database transaction logs in X:Program FilesMicrosoft SQL server
D . Check whether the MSSQLSERVER service is running

Answer: B

Explanation:

References: https://support.symantec.com/en_US/article.TECH160964.html

Which configuration change can the administrator make to minimize sudden IOPS impact on the ESXi server while each SEP endpoint communicates with the Symantec Endpoint Protection Manager?

A company deploys Symantec Endpoint Protection (SEP) to50 virtual machines running on a single ESXi host.

Which configuration change can the administrator make to minimize sudden IOPS impact on the ESXi server while each SEP endpoint communicates with the Symantec Endpoint Protection Manager?
A . Reduce number of content revisions to keep
B . Increase download randomization window
C . Reduce the heartbeat interval
D . Increase Download Insight sensitivity level

Answer: B

Which steps should the Symantec Endpoint Protection administrator take to prevent users from blocking the custom application?

A company allows users to create firewall rules. During the course of business, users are accidentally adding rules that block a custom internal application.

Which steps should the Symantec Endpoint Protection administrator take to prevent users from blocking the custom application?
A . Create an Allow All Firewall rule for the fingerprint of the file and place it at the bottom of the firewall rules above the blue line
B . Create an Allow firewall rule for the application and place it at the bottom of the firewall rules below the blue line
C . Create an Allow for the network adapter type used by the application and place it at the top of the firewall rules below the blue line.
D . Create an Allow Firewall rule for the application and place it at the top of the firewall rules above the blue line.

Answer: A

Explanation:

References: https://support.symantec.com/en_US/article.TECH104433.html

Which two parameters are required to re-establish this replication partnership?

An administrator is re-adding an existing Replication Partner to the local Symantec Endpoint Protection Manager site.

Which two parameters are required to re-establish this replication partnership? (Select two.)
A . Remote site Encryption Password
B . Remote server IP Address and port
C . Remote SQL database account credentials
D . Remote server Administrator credentials
E . Remote site Domain ID

Answer: B,D

Explanation:

References: https://support.symantec.com/en_US/article.TECH104455.html