Certbus > Symantec > Symantec Certified Specialist > 250-428 > 250-428 Online Practice Questions and Answers

250-428 Online Practice Questions and Answers

Questions 4

A company has an application that requires network traffic in both directions to multiple systems at a specific external domain. A firewall rule was created to allow traffic to and from the external domain, but the rule is blocking incoming traffic. What should an administrator enable in the firewall policy to allow this traffic?

A. TCP resequencing

B. Smart DHCP

C. Reverse DNS Lookup

D. Smart WINS

Browse 165 Q&As
Questions 5

An administrator is responsible for the Symantec Endpoint Protection architecture of a large, multi-national company with three regionalized data centers. The administrator needs to collect data from clients; however, the collected data must stay in the local regional data center. Communication between the regional data centers is allowed 20 hours a day.

How should the administrator architect this organization?

A. set up 3 domains

B. set up 3 sites

C. set up 3 locations

D. set up 3 groups

Browse 165 Q&As
Questions 6

A user is unknowingly about to connect to a malicious website and download a known threat within a .rar file. All Symantec Endpoint Protection technologies are installed on the client's system.

In which feature set order must the threat pass through to successfully infect the system?

A. Download Insight, Firewall, IPS

B. Firewall, IPS, Download Insight

C. IPS, Firewall, Download Insight

D. Download Insight, IPS, Firewall

Browse 165 Q&As
Questions 7

A company uses a remote administration tool that is detected and quarantined by Symantec Endpoint Protection (SEP).

Which step can an administrator perform to continue using the remote administration tool without detection by SEP?

A. Create a Tamper Protect exception for the tool

B. Create an Application to Monitor exception for the tool

C. Create a Known Risk exception for the tool

D. Create a SONAR exception for the tool

Browse 165 Q&As
Questions 8

Which action does SONAR take before convicting a process?

A. quarantines the process

B. blocks suspicious behavior

C. reboots the system

D. checks the reputation of the process

Browse 165 Q&As
Questions 9

A company deploys Symantec Endpoint Protection (SEP) to 50 virtual machines running on a single ESXi host.

Which configuration change can the administrator make to minimize sudden IOPS impact on the ESXi server while each SEP endpoint communicates with the Symantec Endpoint Protection Manager?

A. increase Download Insight sensitivity level

B. reduce the heartbeat interval

C. increase download randomization window

D. reduce number of content revisions to keep

Browse 165 Q&As
Questions 10

Which setting can an administrator change that will result in the greatest impact on the speed of delivery of Symantec Endpoint Protection policy changes to the endpoints?

A. Download randomization

B. Heartbeat interval

C. LiveUpdate scheduling frequency

D. Reconnection preferences

Browse 165 Q&As
Questions 11

What should an administrator utilize to identify devices on a Mac?

A. Use DevViewer when the Device is connected

B. Use GatherSymantecInfo when the Device is connected

C. Use DeviceInfo when the Device is connected

D. Use Device Manager when the Device is connected

Browse 165 Q&As
Exam Code: 250-428
Exam Name: Administration of Symantec Endpoint Protection 14
Last Update: Apr 15, 2024
Questions: 165 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99