A) lower the Security Status thresholds
B) raise the Security Status thresholds
C) change the Notifications setting to "Show all notifications"
D) change the Action Summary display to "By number of computers"
Correct Answer
verified
Multiple Choice
A) Disable the firewall on the SEP client.
B) Allow port 8014 through the network firewall between the SEPM and the client.
C) Modify the network firewalls so that stateful packet inspection is performed.
D) Open the ephemeral TCP ports on the SEP client firewall.
Correct Answer
verified
Multiple Choice
A) SONAR
B) Insight
C) Application Control
D) Trusted Web Domain exceptions
Correct Answer
verified
Multiple Choice
A) Tamper protection is enabled.
B) System Lockdown is enabled.
C) Application and Device Control is configured.
D) The padlock on the enable Auto-Protect option is locked.
Correct Answer
verified
Multiple Choice
A) Groups
B) Domains
C) Sites
D) Locations
Correct Answer
verified
Multiple Choice
A) Configure one Virus and Spyware Protection policy with a customized On-Demand scan and set different Exception policies for each group.
B) Configure one Virus and Spyware Protection policy with three customized On-Demand scans.
C) Configure one Virus and Spyware Protection policy with three customized Scheduled scans and setting the schedule to Manual.
D) Configure a different Virus and Spyware Protection policy for each group with customized On- Demand scans.
Correct Answer
verified
Multiple Choice
A) The customers need to enable the Smart DHCP option in their firewall policy.
B) The security option "Block all traffic until the firewall starts and after the firewall stops" is enabled.
C) A location awareness policy has been configured that applies when the service is stopped.
D) The network card is blocked by a Device Control policy.
Correct Answer
verified
Multiple Choice
A) The block rule is below the blue line.
B) The server has an IPS exception for that traffic.
C) Peer-to-peer authentication is allowing the traffic.
D) The server is in the IPS policy excluded hosts list.
Correct Answer
verified
Multiple Choice
A) Block
B) Active Response
C) Quarantine
D) Log
E) Trace
Correct Answer
verified
Multiple Choice
A) 1
B) 2
C) 6
D) 15
Correct Answer
verified
Multiple Choice
A) policy
B) users
C) computers
D) services
E) groups
Correct Answer
verified
Multiple Choice
A) SEPM console Licenses section
B) Symantec Protection Center
C) SEPM Web Access
D) Symantec Support
Correct Answer
verified
Multiple Choice
A) SONAR settings in the Virus and Spyware Protection policy
B) System Lockdown Whitelist in the Application and Device Control policy
C) Insight settings in the Virus and Spyware Protection policy
D) File Cache settings in the Virus and Spyware Protection policy
Correct Answer
verified
Multiple Choice
A) Insight
B) Application and Device Control
C) Network Threat Protection
D) LiveUpdate
Correct Answer
verified
Multiple Choice
A) Subnet
B) Network Services
C) Application Protocol
D) DNS Domain
E) Network Adapters
Correct Answer
verified
Multiple Choice
A) Configure the clients for Pull mode.
B) Decrease the heartbeat interval.
C) Switch to HTTPS for client communications.
D) Switch to IIS as the web server.
Correct Answer
verified
Multiple Choice
A) DNS exception
B) DNS Lookup
C) Reverse DNS Lookup
D) Smart DNS
Correct Answer
verified
Multiple Choice
A) Risk Log
B) System Log
C) SesmLu.log
D) Log.LiveUpdate
Correct Answer
verified
Multiple Choice
A) remote server IP Address and port
B) remote site Encryption Password
C) remote site Domain ID
D) remote server Administrator credentials
E) remote SQL database account credentials
Correct Answer
verified
Multiple Choice
A) Ensure that Risk Tracer is disabled.
B) Load Auto-Protect during the startup of SEP.
C) Enable File Cache across reboots.
D) Modify the policy to use Insight Cache.
Correct Answer
verified
Showing 81 - 100 of 165
Related Exams