Pass4itsure > Symantec > Symantec Certifications > 250-561 > 250-561 Online Practice Questions and Answers

250-561 Online Practice Questions and Answers

Questions 4

Which Endpoint > Setting should an administrator utilize to locate unmanaged endpoints on a network subnet?

A. Discover Endpoints

B. Endpoint Enrollment

C. Discover and Deploy

D. Device Discovery

Buy Now
Questions 5

Which technique randomizes the e memory address map with Memory Exploit Mitigation?

A. SEHOP

B. ROPHEAP

C. ASLR

D. ForceDEP

Buy Now
Questions 6

Which device page should an administrator view to track the progress of an issued device command?

A. Command Status

B. Command History

C. Recent Activity

D. Activity Update

Buy Now
Questions 7

Which option should an administrator utilize to temporarily or permanently block a file?

A. Delete

B. Hide

C. Encrypt

D. Blacklist

Buy Now
Questions 8

Which policy should an administrator edit to utilize the Symantec LiveUpdate server for pre- release content?

A. The Firewall Policy

B. The System Schedule Policy

C. The System Policy

D. The LiveUpdate Policy

Buy Now
Questions 9

What does an end-user receive when an administrator utilizes the Invite User feature to distribute the SES client?

A. An email with a link to directly download the SES client

B. An email with a link to a KB article explaining how to install the SES Agent

C. An email with the SES_setup.zip file attached

D. An email with link to register on the ICDm user portal

Buy Now
Questions 10

Which security control is complementary to IPS, providing a second layer of protection against network attacks?

A. Host Integrity

B. Antimalware

C. Firewall

D. Network Protection

Buy Now
Questions 11

Which type of security threat is used by attackers to exploit vulnerable applications?

A. Lateral Movement

B. Privilege Escalation

C. Command and Control

D. Credential Access

Buy Now
Questions 12

Which two (2) scan range options are available to an administrator for locating unmanaged endpoints? (Select two)

A. IP range within network

B. IP range within subnet

C. Entire Network

D. Entire Subnet

E. Subnet Range

Buy Now
Questions 13

Which statement best describes Artificial Intelligence?

A. A program that automates tasks with a static set of instructions

B. A program that can predict when a task should be performed

C. A program that is autonomous and needs training to perform a task

D. A program that learns from experience and perform autonomous tasks

Buy Now
Exam Code: 250-561
Exam Name: Endpoint Security Complete - Administration R1
Last Update: Mar 04, 2025
Questions: 70
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99