Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

250-561 Exam Dumps - Endpoint Security Complete - Administration R1

Question # 4

Which type of organization is likely to be targeted with emerging threats?

A.

Small organization with externalized managed security

B.

Large organizations with dedicated security teams

C.

Large organization with high turnover

D.

Small organization with little qualified staff

Full Access
Question # 5

Which file should an administrator create, resulting Group Policy Object (GPO)?

A.

Symantec__Agent_package_x64.zip

B.

Symantec__Agent_package_x64.msi

C.

Symantec__Agent_package__32-bit.msi

D.

Symantec__Agent_package_x64.exe

Full Access
Question # 6

Which Firewall Stealth setting prevents OS fingerprinting by sending erroneous OS information back to the attacker?

A.

Disable OS fingerprint profiling

B.

Disable OS fingerprint detection

C.

Enable OS fingerprint masqueradi

D.

Enable OS fingerprint protection

Full Access
Question # 7

Which communication method is utilized within SES to achieve real-time management?

A.

Heartbeat

B.

Standard polling

C.

Push Notification

D.

Long polling

Full Access
Question # 8

A user downloads and opens a PDF file with Adobe Acrobat. Unknown to the user, a hidden script in the file begins downloading a RAT.

Which Anti-malware engine recognizes that this behavior is inconsistent with normal Acrobat functionality, blocks the

behavior and kills Acrobat?

A.

SONAR

B.

Sapient

C.

IPS

D.

Emulator

Full Access
Question # 9

Which two (2) options is an administrator able to use to prevent a file from being fasely detected (Select two)

A.

Assign the file a SHA-256 cryptographic hash

B.

Add the file to a Whitelist policy

C.

Reduce the Intensive Protection setting of the Antimalware policy

D.

Register the file with Symantec's False Positive database

E.

Rename the file

Full Access
Question # 10

An administrator is evaluating an organization's computers for an upcoming SES deployment. Which computer meets the pre-requisites for the SES client?

A.

A computer running Mac OS X 10.8 with 500 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processor

B.

A computer running Mac OS X 10.14 with 400 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processor

C.

A computer running Windows 10 with 400 MB of disk space, 2 GB of RAM, and a 2.4 GHz Intel Pentium 4 processor

D.

A computer running Windows 8 with 380 MB of disk space, 2 GB of RAM, and a 2.8 GHz Intel Pentium 4 processor

Full Access