March Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

Endpoint Security Complete - Administration R1 Question and Answers

Endpoint Security Complete - Administration R1

Last Update Mar 29, 2024
Total Questions : 70

We are offering FREE 250-561 Symantec exam questions. All you do is to just go and sign up. Give your details, prepare 250-561 free exam questions and then go for complete pool of Endpoint Security Complete - Administration R1 test questions that will help you more.

250-561 pdf

250-561 PDF

$35  $99.99
250-561 Engine

250-561 Testing Engine

$42  $119.99
250-561 PDF + Engine

250-561 PDF + Testing Engine

$56  $159.99
Questions 1

Which two (2) options is an administrator able to use to prevent a file from being fasely detected (Select two)

Options:

A.  

Assign the file a SHA-256 cryptographic hash

B.  

Add the file to a Whitelist policy

C.  

Reduce the Intensive Protection setting of the Antimalware policy

D.  

Register the file with Symantec's False Positive database

E.  

Rename the file

Discussion 0
Questions 2

What characterizes an emerging threat in comparison to traditional threat?

Options:

A.  

Emerging threats use new techniques and 0-day vulnerability to propagate.

B.  

Emerging threats requires artificial intelligence to be detected.

C.  

Emerging threats are undetectable by signature based engines.

D.  

Emerging threats are more sophisticated than traditional threats.

Discussion 0
Questions 3

Which Security Control dashboard widget should an administrator utilize to access detailed areas for a given security control ?

Options:

A.  

Learn More

B.  

Quick Links

C.  

More Info

D.  

Latest Tasks

Discussion 0
Questions 4

Which rule types should be at the bottom of the list when an administrator adds device control rules?

Options:

A.  

General "catch all" rules

B.  

General "brand defined" rules

C.  

Specific "device type" rules

D.  

Specific "device model" rules

Discussion 0
Questions 5

Why would an administrator choose the Server-optimized installation option when creating an installation package?

Options:

A.  

To limit the Intrusion Prevention policy to use server-only signatures.

B.  

To add the Server-optimized Firewall policy

C.  

To add the SES client's Optimize Memory setting to the default server installation.

D.  

To reduce the SES client's using resources that are required for other server-specific processes.

Discussion 0
Questions 6

What is the frequency of feature updates with SES and the Integrated Cyber Defense Manager (ICDm)

Options:

A.  

Monthly

B.  

Weekly

C.  

Quarterly

D.  

Bi-monthly

Discussion 0
Questions 7

Which report template includes a summary of risk distribution by devices, users, and groups?

Options:

A.  

Device Integrity

B.  

Threat Distribution

C.  

Comprehensive

D.  

Weekly

Discussion 0
Questions 8

Which statement best defines Machine Learning?

Options:

A.  

A program that needs user input to perform a task.

B.  

A program that teams from observing other programs.

C.  

A program that learns from experience to optimize the output of a task.

D.  

A program that require data to perform a task.

Discussion 0
Questions 9

Which alert rule category includes events that are generated about the cloud console?

Options:

A.  

Security

B.  

Diagnostic

C.  

System

D.  

Application Activity

Discussion 0
Questions 10

Which IPS Signature type is Primarily used to identify specific unwanted traffic?

Options:

A.  

Attack

B.  

Probe

C.  

Audit

D.  

Malcode

Discussion 0