QUESTION 31
A company uses a remote administration tool that is detected and quarantined by Symantec Endpoint Protection (SEP). Which step can an administrator perform to continue using the remote administration tool without detection by SEP?
Correct Answer: C
QUESTION 32
Catastrophic hardware failure has occurred on a single Symantec Endpoint Protection Manager (SEPM) in an environment with two SEPMs. What is the quickest way an administrator can restore the environment to its original state?
Correct Answer: B
QUESTION 33
An administrator is unable to delete a location. What is the likely cause?
Correct Answer: D
QUESTION 34
Which task is unavailable fo r administrative accounts that authenticate using RSA SecurID Authentication?
Correct Answer: A
QUESTION 35
An administrator is reviewing an Infected Clients Report and notices that a client repeatedly shows the same malware detection. Although the client remediates the files, the infection continues to display in the logs. Which two functions should be enabled to automate enhanced remediation of a detected threat and its related side effects? (Select two.)
Correct Answer: BD
QUESTION 36
Which protectio n technology can detect botnet command and control traffic generated on the Symantec Endpoint Protection client machine?
Correct Answer: D
QUESTION 37
A company has 10,000 Symantec Endpoint Protection (SEP) clients deployed using two Symantec Endpoint Protection Managers (SEPMs). Which configuration is recommended to ensure that each SEPM is able to effectively handle the communications load with the SEP clients?
Correct Answer: D
QUESTION 38
Administrators at a company share a single terminal for configuring Symantec Endpoint Protection. The administrators want to ensure that each administrator using the console is forced to authenticate using their individual credentials. They are concerned that administrators may forget to log off the terminal, which would easily allow others to gain access to the Symantec Endpoint Protection Manager (SEPM) console. Which setting should the administrator disable to minimize the risk of non-authorized users logging into the SEPM console?
Correct Answer: A
QUESTION 39
In Symantec Endpoint Protection 12.1 Enterprise Edition, what happens when the license expires?
Correct Answer: D
QUESTION 40
A company plans to install six Symantec Endpoint Protection Managers (SEPMs) spread evenly across two sites. The administrator needs to direct replication activity to SEPM3 server in Site 1 and SEPM4 in Site 2. Which two actions should the administrator take to direct replication activity to SEPM3 and SEPM4? (Select two.)
Correct Answer: CD
FreeInstant Access to Instant Access to