An administrator is troubleshooting a Symantec Endpoint Protection (SEP) replication.
Which component log should the administrator check to determine whether the communication between the two sites is working correctly?
Which Indicator of Compromise might be detected as variations in the behavior of privileged users that indicate that their account is being used by someone else to gain a foothold in an environment?
Which statement demonstrates how Symantec EDR hunts and detects IoCs in the environment?
What should an administrator know regarding the differences between a Domain and a Tenant in ICDm?
When a SEPM is enrolled in ICDm, which policy can only be managed from the cloud?
An organization is considering a single site for their Symantec Endpoint Protection environment. What are two (2) reasons that the organization should consider? (Select two)