Which Symantec Endpoint Protection technology blocks a downloaded program from installing browser plugins?
A. Intrusion Prevention
B. SONAR
C. Application and Device Control
D. Tamper Protection
Which option is unavailable in the Symantec Endpoint Protection console to run a command on the group menu item?
A. Disable SONAR
B. Scan
C. Disable Network Threat Protection
D. Update content and scan
A company needs to forward log data from Data Center A to Data Center B during off peak hours only. How should the company architect its Symantec Endpoint Protection environment?
A. Set up two sites and schedule replication between them during off peak hours
B. Set up a single site and configure the clients to send their logs to the Manager during off peak hours
C. Set up a Group Update Provider (GUP) at Data Center A and configure it to send logs during off peak hours
D. Set up a LiveUpdate Server at Data Center A and configure it to send logs during off peak hours
An administrator configures the scan duration for a scheduled scan. The scan fails to complete in the specified time period.
When will the next scheduled scan occur on the computer?
A. when the computer reboots
B. when the user restarts the scan
C. at the next scheduled scan period
D. within the next hour
After several failed logon attempts, the Symantec Endpoint Protection Manager (SEPM) has locked the default admin account. An administrator needs to make system changes as soon as possible to address an outbreak, but the admin account is the only account. Which action should the administrator take to correct the problem with minimal impact to the existing environment?
A. wait 15 minutes and attempt to log on again
B. restore the SEPM from a backup
C. run the Management Server and Configuration Wizard to reconfigure the server
D. reinstall the SEPM
An administrator needs to configure Secure Socket Layer (SSL) communication for clients. In the httpd.conf file, located on the Symantec Endpoint Protection Manager (SEPM), the administrator removes the hashmark (#) from the text string displayed below.
#Include conf/ssl/sslForcClients.conf<
Which two tasks must the administrator perform to complete the SSL configuration? (Select two.)
A. edit site.properties and change the port to 443
B. restart the Symantec Endpoint Protection Manager Webserver service
C. change the default certificates on the SEPM and reboot
D. change the Management Server List and enable HTTPs
E. change the port in Clients > Group > Policies > Settings > Communication Settings and force the clients to reconnect
Which feature reduces the impact of Auto-Protect on a virtual client guest operating system?
A. Network Shared Insight Cache
B. Virtual Image Exception
C. Scan Randomization
D. Virtual Shared Insight Cache
What does SONAR use to reduce false positives?
A. Virus and Spyware definitions
B. File Fingerprint list
C. Symantec Insight
D. Extended File Attributes (EFA) table
A Symantec Endpoint Protection Manager (SEPM) administrator notices performance issues with the SEPM server. The Client tab becomes unresponsive in the SEPM console and .DAT files accumulate in the "agentinfo" folder.
Which tool should the administrator use to gather log files to submit to Symantec Technical Support?
A. collectLog.cmd
B. LogExport.exe
C. ExportLog.vbs
D. smc.exe
A company needs to configure an Application and Device Control policy to block read/write access to all USB removable media on its Symantec Endpoint Protection (SEP) systems.
Which tool should an administrator use to format the GUID and device IDs as required by SEP?
A. CheckSum.exe
B. DeviceTree.exe
C. TaskMgr.exe
D. DevViewer.exe