Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Endpoint Security Complete - Administration R1

Last Update 4 hours ago Total Questions : 70

The Endpoint Security Complete - Administration R1 content is now fully updated, with all current exam questions added 4 hours ago. Deciding to include 250-561 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our 250-561 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these 250-561 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Endpoint Security Complete - Administration R1 practice test comfortably within the allotted time.

Question # 11

After editing and saving a policy, an administrator is prompted with the option to apply the edited policy to any assigned device groups.

What happens to the new version of the policy if the administrator declines the option to apply it?

A.

The policy display is returned to edit mode

B.

The new version of the policy is deleted

C.

An unassigned version of the policy is created

D.

The new version of the policy is added to the " in progress " list

Question # 12

An administrator is evaluating an organization ' s computers for an upcoming SES deployment. Which computer meets the pre-requisites for the SES client?

A.

A computer running Mac OS X 10.8 with 500 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processor

B.

A computer running Mac OS X 10.14 with 400 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processor

C.

A computer running Windows 10 with 400 MB of disk space, 2 GB of RAM, and a 2.4 GHz Intel Pentium 4 processor

D.

A computer running Windows 8 with 380 MB of disk space, 2 GB of RAM, and a 2.8 GHz Intel Pentium 4 processor

Question # 13

Which statement best describes Artificial Intelligence?

A.

A program that automates tasks with a static set of instructions

B.

A program that can predict when a task should be performed

C.

A program that is autonomous and needs training to perform a task

D.

A program that learns from experience and perform autonomous tasks

Question # 14

Which rule types should be at the bottom of the list when an administrator adds device control rules?

A.

General " catch all " rules

B.

General " brand defined " rules

C.

Specific " device type " rules

D.

Specific " device model " rules

Question # 15

Which Antimalware technology is used after all local resources have been exhausted?

A.

Sapient

B.

ITCS

C.

Emulator

D.

Reputation

Question # 16

Which type of security threat is used by attackers to exploit vulnerable applications?

A.

Lateral Movement

B.

Privilege Escalation

C.

Command and Control

D.

Credential Access

Question # 17

Which URL is responsible for notifying the SES agent that a policy change occurred in the cloud console?

A.

spoc.norton.com

B.

stnd-ipsg.crsi-symantec.com

C.

ent-shasta.rrs-symantec.com

D.

ocsp.digicert.com

Question # 18

Which policy should an administrator edit to utilize the Symantec LiveUpdate server for pre-release content?

A.

The Firewall Policy

B.

The System Schedule Policy

C.

The System Policy

D.

The LiveUpdate Policy

Question # 19

What are the Exploit Mitigation security control ' s mitigation techniques designed to prevent?

A.

Packed file execution

B.

Misbehaving applications

C.

File-less attacks

D.

Rootkit downloads

Question # 20

What is the primary issue pertaining to managing roaming users while utilizing an on-premise solution?

A.

The endpoint is missing timely policy update

B.

The endpoint is absent of the management console

C.

The endpoint fails to receive content update

D.

The endpoint is more exposed to threats

Go to page: