Which option is a characteristic of a Symantec Endpoint Protection (SEP) domain?

Which option is a characteristic of a Symantec Endpoint Protection (SEP) domain?A . Every administrator from one domain can view data in other domains.B . Each domain has its own management server and database.C . Data for each domain is stored in its own separate SEP database.D . Domains share...

September 27, 2019 No Comments READ MORE +

Which two options are available when configuring DNS change detections for SONAR? (Select two.)

Which two options are available when configuring DNS change detections for SONAR? (Select two.)A . LogB . QuarantineC . BlockD . Active ResponseE . TraceView AnswerAnswer: A,C

September 26, 2019 No Comments READ MORE +

Why does Power Eraser need Internet access?

Why does Power Eraser need Internet access?A . Validate root certificates on all portable executables (PXE) filesB . Leverage Symantec InsightC . Ensure the Power Eraser tool is the latest releaseD . Look up CVE vulnerabilitiesView AnswerAnswer: B Explanation: References: https://support.symantec.com/en_US/article.TECH134803.html

September 24, 2019 No Comments READ MORE +

Which task should an administrator perform to troubleshoot operation of the Symantec Endpoint Protection embedded database?

Which task should an administrator perform to troubleshoot operation of the Symantec Endpoint Protection embedded database?A . Verify the sqlserver.exe service is running on port 1433B . Verify that dbsrv11.exe is listening on port 2638C . Check the database transaction logs in X:Program FilesMicrosoft SQL serverD . Check whether the...

September 23, 2019 No Comments READ MORE +

Which two instances could cause Symantec Endpoint Protection to be unable to remediate a file? (Select two.)

Which two instances could cause Symantec Endpoint Protection to be unable to remediate a file? (Select two.)A . Another scan is in progress.B . The detected file is in use.C . The file has good reputation.D . There are insufficient file permissions.E . The file is marked for deletion by...

September 23, 2019 No Comments READ MORE +

Which configuration change can the administrator make to minimize sudden IOPS impact on the ESXi server while each SEP endpoint communicates with the Symantec Endpoint Protection Manager?

A company deploys Symantec Endpoint Protection (SEP) to50 virtual machines running on a single ESXi host. Which configuration change can the administrator make to minimize sudden IOPS impact on the ESXi server while each SEP endpoint communicates with the Symantec Endpoint Protection Manager?A . Reduce number of content revisions to...

September 20, 2019 No Comments READ MORE +

Which steps should the Symantec Endpoint Protection administrator take to prevent users from blocking the custom application?

A company allows users to create firewall rules. During the course of business, users are accidentally adding rules that block a custom internal application. Which steps should the Symantec Endpoint Protection administrator take to prevent users from blocking the custom application?A . Create an Allow All Firewall rule for the...

September 20, 2019 No Comments READ MORE +

Which two parameters are required to re-establish this replication partnership?

An administrator is re-adding an existing Replication Partner to the local Symantec Endpoint Protection Manager site. Which two parameters are required to re-establish this replication partnership? (Select two.)A . Remote site Encryption PasswordB . Remote server IP Address and portC . Remote SQL database account credentialsD . Remote server Administrator...

September 18, 2019 No Comments READ MORE +

Which Symantec Endpoint Protection defense mechanism provides protection against threats that propagate from system to system through the use of autorun.inf files?

Which Symantec Endpoint Protection defense mechanism provides protection against threats that propagate from system to system through the use of autorun.inf files?A . Host IntegrityB . SONARC . Application and Device ControlD . EmulatorView AnswerAnswer: C

September 17, 2019 No Comments READ MORE +

How are Insight results stored?

How are Insight results stored?A . Encrypted on the Symantec Endpoint Protection ClientB . Unencrypted on the Symantec Endpoint Protection ManagerC . Encrypted on the Symantec Endpoint Protection ManagerD . Unencrypted on the Symantec Endpoint Protection ClientView AnswerAnswer: A

September 17, 2019 No Comments READ MORE +