Black Friday Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Symantec 250-561 Endpoint Security Complete - Administration R1 Exam Practice Test

Page: 1 / 7
Total 70 questions

Endpoint Security Complete - Administration R1 Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

Which Firewall Stealth setting prevents OS fingerprinting by sending erroneous OS information back to the attacker?

Options:

A.

Disable OS fingerprint profiling

B.

Disable OS fingerprint detection

C.

Enable OS fingerprint masqueradi

D.

Enable OS fingerprint protection

Question 2

Which URL is responsible for notifying the SES agent that a policy change occurred in the cloud console?

Options:

A.

spoc.norton.com

B.

stnd-ipsg.crsi-symantec.com

C.

ent-shasta.rrs-symantec.com

D.

ocsp.digicert.com

Question 3

An endpoint is offline, and the administrator issues a scan command. What happens to the endpoint when it restarts, if it lacks connectivity?

Options:

A.

The system is scanning when started.

B.

The system downloads the content without scanning.

C.

The system starts without scanning.

D.

The system scans after the content update is downloaded.

Question 4

Which default role has the most limited permission in the Integrated Cyber Defense Manager?

Options:

A.

Restricted Administrator

B.

Limited Administrator

C.

Server Administrator

D.

Endpoint Console Domain Administrator

Question 5

Which report template includes a summary of risk distribution by devices, users, and groups?

Options:

A.

Device Integrity

B.

Threat Distribution

C.

Comprehensive

D.

Weekly

Question 6

In which phase of MITRE framework would attackers exploit faults in software to directly tamper with system memory?

Options:

A.

Exfiltration

B.

Discovery

C.

Execution

D.

Defense Evasion

Question 7

Which two (2) skill areas are critical to the success of incident Response Teams (Select two)

Options:

A.

Project Management

B.

Incident Management

C.

Cyber Intelligence

D.

Incident Response

E.

Threat Analysis

Question 8

Which SES feature helps administrator apply policies based on specific endpoint profiles?

Options:

A.

Device Groups

B.

Device Profiles

C.

Policy Bundles

D.

Policy Groups

Question 9

An administrator is evaluating an organization's computers for an upcoming SES deployment. Which computer meets the pre-requisites for the SES client?

Options:

A.

A computer running Mac OS X 10.8 with 500 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processor

B.

A computer running Mac OS X 10.14 with 400 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processor

C.

A computer running Windows 10 with 400 MB of disk space, 2 GB of RAM, and a 2.4 GHz Intel Pentium 4 processor

D.

A computer running Windows 8 with 380 MB of disk space, 2 GB of RAM, and a 2.8 GHz Intel Pentium 4 processor

Question 10

Which device page should an administrator view to track the progress of an issued device command?

Options:

A.

Command Status

B.

Command History

C.

Recent Activity

D.

Activity Update

Page: 1 / 7
Total 70 questions