Certbus > Symantec > Symantec SCS Certification > 250-561 > 250-561 Online Practice Questions and Answers

250-561 Online Practice Questions and Answers

Questions 4

Which URL is responsible for notifying the SES agent that a policy change occurred in the cloud console?

A. spoc.norton.com

B. stnd-ipsg.crsi-symantec.com

C. ent-shasta.rrs-symantec.com

D. ocsp.digicert.com

Browse 70 Q&As
Questions 5

What characterizes an emerging threat in comparison to traditional threat?

A. Emerging threats use new techniques and 0-day vulnerability to propagate.

B. Emerging threats requires artificial intelligence to be detected.

C. Emerging threats are undetectable by signature based engines.

D. Emerging threats are more sophisticated than traditional threats.

Browse 70 Q&As
Questions 6

Which Firewall Stealth setting prevents OS fingerprinting by sending erroneous OS information back to the attacker?

A. Disable OS fingerprint profiling

B. Disable OS fingerprint detection

C. Enable OS fingerprint masqueradi

D. Enable OS fingerprint protection

Browse 70 Q&As
Questions 7

Which device page should an administrator view to track the progress of an issued device command?

A. Command Status

B. Command History

C. Recent Activity

D. Activity Update

Browse 70 Q&As
Questions 8

Which option should an administrator utilize to temporarily or permanently block a file?

A. Delete

B. Hide

C. Encrypt

D. Blacklist

Browse 70 Q&As
Questions 9

An endpoint is offline, and the administrator issues a scan command. What happens to the endpoint when it restarts, if it lacks connectivity?

A. The system is scanning when started.

B. The system downloads the content without scanning.

C. The system starts without scanning.

D. The system scans after the content update is downloaded.

Browse 70 Q&As
Questions 10

An administrator needs to create a new Report Template that will be used to track firewall activity. Which two (2) report template settings are optional? (Select 2)

A. Output format

B. Generation schedule

C. Email recipients

D. Time frame

E. Size restrictions

Browse 70 Q&As
Questions 11

Which Symantec component is required to enable two factor authentication with VIP on the Integrated Cyber Defense manager (ICDm)?

A. A physical token or a software token

B. A software token and a VIP server

C. A software token and an active directory account

D. A physical token or a secure USB key

Browse 70 Q&As
Questions 12

Which designation should an administrator assign to the computer configured to find unmanaged devices?

A. Discovery Broker

B. Discovery Agent

C. Discovery Manager

D. Discovery Device

Browse 70 Q&As
Questions 13

An administrator suspects that several computers have become part of a botnet. What should the administrator do to detect botnet activity on the network?

A. Enable the Command and Control Server Firewall

B. Add botnet related signatures to the IPS policy's Audit Signatures list

C. Enable the IPS policy's Show notification on the device setting

D. Set the Antimalware policy's Monitoring Level to 4

Browse 70 Q&As
Questions 14

Which security threat uses malicious code to destroy evidence, break systems, or encrypt data?

A. Execution

B. Persistence

C. Impact

D. Discovery

Browse 70 Q&As
Questions 15

Which file should an administrator create, resulting Group Policy Object (GPO)?

A. Symantec__Agent_package_x64.zip

B. Symantec__Agent_package_x64.msi

C. Symantec__Agent_package__32-bit.msi

D. Symantec__Agent_package_x64.exe

Browse 70 Q&As
Questions 16

What happens when an administrator blacklists a file?

A. The file is assigned to the Blacklist task list

B. The file is automatically quarantined

C. The file is assigned to a chosen Blacklist policy

D. The file is assigned to the default Blacklist policy

Browse 70 Q&As
Questions 17

The ICDm has generated a blacklist task due to malicious traffic detection. Which SES component was utilized to make that detection?

A. Antimalware

B. Reputation

C. Firewall

D. IPS

Browse 70 Q&As
Questions 18

Which term or expression is utilized when adversaries leverage existing tools in the environment?

A. opportunistic attack

B. script kiddies

C. living off the land

D. file-less attack

Browse 70 Q&As
Exam Code: 250-561
Exam Name: Endpoint Security Complete - Administration R1
Last Update: Apr 30, 2024
Questions: 70 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99