Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

250-428 Exam Dumps - Administration of Symantec Endpoint Protection 14

Go to page:
Question # 9

What two (2) steps should an administrator take to troubleshoot firewall with the Symantec Endpoint Protection client (Select two.)

A.

Disable the Symantec Endpoint Protection client and reproduce the issue.

B.

Add an "Allow AH" traffic rule to the assigned firewall policy and reproduce the issue.

C.

Create an exclusion in the Exceptions policy and reproduce the issue.

D.

Withdraw the assigned firewall policy and reproduce the issue.

E.

Enable TSE debug on the Symantec Endpoint Protect client and reproduce the issue.

Full Access
Question # 10

Which task should an administrator perform to troubleshoot operation of the Symantec Endpoint Protection embedded database?

A.

Verify the sqlserver.exe service is running on port 1433

B.

Verify that dbsrv11.exe is listening on port 2638

C.

Check the database transaction logs in X:\Program Files\Microsoft SQL server

D.

Check whether the MSSQLSERVER service is running

Full Access
Question # 11

Which technology can prevent an unknown executable from being downloaded through a browser session?

A.

Browser Intrusion Prevention

B.

Download Insight

C.

Application Control

D.

SONAR

Full Access
Question # 12

In addition to performance improvements, which two benefits does Insight provide? (Select two.)

A.

Reputation scoring for documents

B.

Zero-day threat detection

C.

Protection against malicious java scripts

D.

False positive mitigation

E.

Blocking of malicious websites

Full Access
Question # 13

An organization recently experienced an outbreak and is conducting a health check of their environment! What Protection Technology should the SEP team enable to prevent vulnerability attacks on software?

A.

Memory Exploit Mitigation (MEM)

B.

System Lockdown

C.

Behavior Monitoring (SONAR)

D.

Host Integrity

Full Access
Question # 14

Which protection technology can detect botnet command and control traffic generated on the Symantec Endpoint Protection client machine?

A.

Intrusion Prevention

B.

Insight

C.

Risk Tracer

D.

SONAR

Full Access
Question # 15

Which action must a Symantec Endpoint Protection administrator take before creating custom Intrusion Prevention signatures?

A.

Define signature variables

B.

Enable signature logging

C.

Change the custom signature order

D.

Create a Custom Intrusion Prevention Signature library

Full Access
Question # 16

Which two Symantec Endpoint Protection components are used to distribute content updates? (Select two.)

A.

Group Update Provider (GUP)

B.

Shared Insight Cache Server

C.

Symantec Protection Center

D.

Symantec Endpoint Protection Manager

E.

Symantec Insight Database

Full Access
Go to page: