An Application Control policy includes an Allowed list and a Blocked list. A user wants to use an application that is neither on the Allowed list nor on the Blocked list. What can the user do to gain access to the application?
Which term or expression is utilized when adversaries leverage existing tools in the environment?
An Application Control policy includes an Allowed list and a Blocked list. A user wants to use an application that is neither on the Allowed list nor on the Blocked list. What can the user do to gain access to the application?
Which SES security control protects a user against data leakage if they encounter a man-in-the-middle attack?
An administrator changes the Virus and Spyware Protection policy for a specific group that disables Auto-Protect. The administrator assigns the policy and the client systems apply the corresponding policy serial number. Upon visual inspection of a physical client system, the policy serial number is correct. However, Auto-Protect is still enabled on the client system.
Which action should the administrator take to ensure that the desired setting is in place for the client?
Which Discover and Deploy process requires the LocalAccountTokenFilterPolicy value to be added to the Windows registry of endpoints, before the process begins?
Which option should an administrator utilize to temporarily or permanently block a file?
How would an administrator specify which remote consoles and servers have access to the management server?
An administrator notices that some entries list that the Risk was partially removed. The administrator needs to determine whether additional steps are necessary to remediate the threat.
Where in the Symantec Endpoint Protection Manager console can the administrator find additional information on the risk?
Which action must a Symantec Endpoint Protection administrator take before creating custom Intrusion Prevention signatures?
Which technology can prevent an unknown executable from being downloaded through a browser session?
What Threat Defense for Active Directory feature disables a process's ability to spawn another process, overwrite a part of memory, run recon commands, or communicate to the network?
Which Firewall rule components should an administrator configure to blockfacebook.comuse during business hours?
Which two (2) instances could cause Symantec Endpoint Protection to be unable to remediate a file? (Select two.)
An organization recently experienced an outbreak and is conducting a health check of the environment. What Protection Technology can the SEP team enable to control and monitor the behavior of applications?
Which rule types should be at the bottom of the list when an administrator adds device control rules?
What is the result of disjointed telemetry collection methods used within an organization?
Which two (2) criteria are used by Symantec Insight to evaluate binary executables? (Select two.)
Using a hybrid environment, if a SEPM-managed endpoint cannot connect to the SEPM, how quickly can an administrator receive a security alert if the endpoint is using a public hot-spot?
What is the maximum number of SEPMs a single Management Platform is able to connect to?
Files are blocked by hash in the deny list policy. Which algorithm is supported, in addition to MD5?
Which type of security threat is used by attackers to exploit vulnerable applications?
Which Endpoint Setting should an administrator utilize to locate unmanaged endpoints on a network subnet?
A file has been identified as malicious.
Which feature of SEDR allows an administrator to manually block a specific file hash?
Which type of communication is blocked, when isolating the endpoint by clicking on the isolate button in SEDR?
How should an administrator set up an alert to be notified when manual remediation is needed on an endpoint?
Which statement demonstrates how Symantec EDR hunts and detects IoCs in the environment?
What feature is used to get a comprehensive picture of infected endpoint activity?
Which alert rule category includes events that are generated about the cloud console?
An organization is considering a single site for their Symantec Endpoint Protection environment. What are two (2) reasons that the organization should consider? (Select two)
Which security control is complementary to IPS, providing a second layer of protection against network attacks?
Which rule types should be at the bottom of the list when an administrator adds device control rules?
In the virus and Spyware Protection policy, an administrator sets the First action to Clean risk and sets If first action fails to Delete risk. Which two (2) factors should the administrator consider? (Select two.)
Which type of security threat continues to threaten endpoint security after a system reboot?