Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which task should an administrator perform to troubleshoot operation of the Symantec Endpoint Protection embedded database?

A.

Verify the sqlserver.exe service is running on port 1433

B.

Verify that dbsrv11.exe is listening on port 2638

C.

Check the database transaction logs in X:\Program Files\Microsoft SQL server

D.

Check whether the MSSQLSERVER service is running

Full Access
Question # 5

An administrator is reviewing an Infected Clients Report and notices that a client repeatedly shows the same malware detection. Although the client remediates the files, the infection continues to display in the logs.

Which two functions should be enabled to automate enhanced remediation of a detected threat and its related side effects? (Select two.)

A.

Stop Service Automatically

B.

Stop and Reload AutoProtect

C.

Terminate Processes Automatically

D.

Risk Tracer

E.

Early Launch Anti-Malware Driver

Full Access
Question # 6

A company uses a remote administration tool that is detected and quarantined by Symantec Endpoint Protection (SEP).

Which step can an administrator perform to continue using the remote administration tool without detection by SEP?

A.

Create a Tamper Protect exception for the tool

B.

Create a SONAR exception for the tool

C.

Create an Application to Monitor exception for the tool

D.

Create a Known Risk exception for the tool

Full Access
Question # 7

A large-scale virus attack is occurring and a notification condition is configured to send an email whenever viruses infect five computers on the network. A Symantec Endpoint Protection administrator has set a one hour damper period for that notification condition.

How many notifications does the administrator receive after 30 computers are infected in two hours?

A.

1

B.

2

C.

6

D.

15

Full Access
Question # 8

Which technology can prevent an unknown executable from being downloaded through a browser session?

A.

Browser Intrusion Prevention

B.

Download Insight

C.

Application Control

D.

SONAR

Full Access
Question # 9

What is a valid Symantec Endpoint Protection (SEP) single site design?

A.

Multiple MySQL databases

B.

One Microsoft SQL Server database

C.

One Microsoft SQL Express database

D.

Multiple embedded databases

Full Access
Question # 10

An administrator is troubleshooting a Symantec Endpoint Protection (SEP) replication.

Which component log should the administrator check to determine whether the communication between the two sites is working correctly?

A.

Tomcat

B.

Apache Web Server

C.

Group Update Provider (GUP)

D.

SQL Server

Full Access
Question # 11

Why does Power Eraser need Internet access?

A.

Validate root certificates on all portable executables (PXE) files

B.

Leverage Symantec Insight

C.

Ensure the Power Eraser tool is the latest release

D.

Look up CVE vulnerabilities

Full Access
Question # 12

You have executed the vxdg -g diskgroup adddisk disk_name= command.

Which switch needs to be added to force VxVM to take the disk media name of the failed disk and assign it to the new replacement disk?

A.

-force

B.

-k

C.

-f

D.

-assign

Full Access
Question # 13

A Symantec Endpoint Protection (SEP) administrator receives multiple reports that machines are experiencing performance issues. The administrator discovers that the reports happen about the same time as the scheduled LiveUpdate.

Which setting should the SEP administrator configure to minimize I/O when LiveUpdate occurs?

A.

Disable Allow user-defined scans to run when the scan author is logged off

B.

Change the LiveUpdate schedule

C.

Disable Run an Active Scan when new definitions arrive

D.

Change the Administrator-defined scan schedule

Full Access
Question # 14

How are Insight results stored?

A.

Encrypted on the Symantec Endpoint Protection Client

B.

Unencrypted on the Symantec Endpoint Protection Manager

C.

Encrypted on the Symantec Endpoint Protection Manager

D.

Unencrypted on the Symantec Endpoint Protection Client

Full Access
Question # 15

An organization recently experienced an outbreak and is conducting a health check of their environment! What Protection Technology should the SEP team enable to prevent vulnerability attacks on software?

A.

Memory Exploit Mitigation (MEM)

B.

System Lockdown

C.

Behavior Monitoring (SONAR)

D.

Host Integrity

Full Access
Question # 16

A large software company runs a small engineering department that is remotely located over a slow WAN connection.

Which option should the company use to install an exported Symantec Endpoint Protection (SEP) package to the remote site using the smallest amount of network bandwidth?

A.

a SEP package using Basic content

B.

a SEP package using a policy defined Single Group Update Provider (GUP)

C.

a SEP package using a policy defined Multiple Group Update Provider (GUP) list

D.

a SEP package using the Install Packages tab

Full Access
Question # 17

You have just started a relayout operation in a live test environment, and you want to limit the impact of your work on concurrent testing activities. You also want to accommodate the need to constrain a relayout job’s performance impact on concurrent activities.

What would you do to perform this task?

A.

Use the "set iodelay" option of vxtask to throttle the VxVM task.

B.

Use the "set iowait" option of vxtask to throttle the VxVM task.

C.

Use the "set slow" option of vxtask to throttle the VxVM task.

D.

Use the "set nice" option of vxtask to throttle the VxVM task.

Full Access
Question # 18

Which Symantec Endpoint Protection technology blocks a downloaded program from installing browser plugins?

A.

Intrusion Prevention

B.

SONAR

C.

Tamper Protection

D.

Application and Device Control

Full Access
Question # 19

Which action does the Shared Insight Cache (SIC) server take when the whitelist reaches maximum capacity?

A.

The SIC server allocates additional memory for the whitelist as needed.

B.

The SIC server will start writing the cache to disk.

C.

The SIC server will remove the least recently used items based on the prune size.

D.

The SIC server will remove items with the fewest number of votes.

Full Access
Question # 20

A company needs to configure an Application and Device Control policy to block read/write access to all USB removable media on its Symantec Endpoint Protection (SEP) systems.

Which tool should an administrator use to format the GUID and device IDs as required by SEP?

A.

CheckSum.exe

B.

DeviceTree.exe

C.

TaskMgr.exe

D.

DevViewer.exe

Full Access