Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

250-428 Administration of Symantec Endpoint Protection 14 is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

250-428 Practice Questions

Administration of Symantec Endpoint Protection 14

Last Update 4 days ago
Total Questions : 135

Dive into our fully updated and stable 250-428 practice test platform, featuring all the latest Endpoint Protection 14 exam questions added this week. Our preparation tool is more than just a Symantec study aid; it's a strategic advantage.

Our free Endpoint Protection 14 practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 250-428. Use this test to pinpoint which areas you need to focus your study on.

250-428 PDF

250-428 PDF (Printable)
$43.75
$124.99

250-428 Testing Engine

250-428 PDF (Printable)
$50.75
$144.99

250-428 PDF + Testing Engine

250-428 PDF (Printable)
$63.7
$181.99
Question # 11

Which settings can impact the Files trusted count?

Question # 11

Options:

A.  

System Lockdown Whitelist in the Application and Device Control Policy

B.  

File Cache settings in the Virus and Spyware Protection policy

C.  

Insight settings in the Virus and Spyware Protection policy

D.  

SONAR settings in the Virus and Spyware Protection policy

Discussion 0
Question # 12

A Symantec Endpoint Protection (SEP) administrator is remotely deploying SEP clients, but the clients are failing to install on Windows XP.

What are two possible reasons for preventing installation? (Select two.)

Options:

A.  

Windows firewall is enabled.

B.  

Internet Connection firewall is disabled.

C.  

Administrative file shares are enabled.

D.  

Simple file sharing is enabled.

E.  

Clients are configured for DHCP.

Discussion 0
Question # 13

An administrator plans to implement a multi-site Symantec Endpoint Protection (SEP) deployment. The administrator needs to determine whether replication is viable without needing to make network firewall changes or change defaults in SEP.

Which port should the administrator verify is open on the path of communication between the two proposed sites?

Options:

A.  

1433

B.  

2967

C.  

8014

D.  

8443

Discussion 0
Question # 14

An administrator is recovering from a Symantec Endpoint Manager (SEPM) site failure.

Which file should the administrator use during an install of SEPM to recover the lost environment according to Symantec Disaster Recovery Best Practice documentation?

Options:

A.  

Original installation log

B.  

Sylink.xml file from the SEPM

C.  

Settings.properties file

D.  

Recovery_timestamp file

Discussion 0
Question # 15

An administrator selects the Backup files before attempting to repair the Remediations option in the Auto-Protect policies.

Which two actions occur when a virus is detected? (Select two.)

Options:

A.  

replace the file with a place holder

B.  

check the reputation

C.  

store in Quarantine folder

D.  

send the file to Symantec Insight

E.  

encrypt the file

Discussion 0
Question # 16

Match the following list of ports used by Symantec Endpoint Protection (SEP) to the defining characteristics by clicking and dragging the port on the left to the corresponding description on the right.

Question # 16

Options:

Discussion 0
Question # 17

Why is Notepad unable to save the changes to the file in the image below?

Question # 17

Options:

A.  

SONAR High Risk detection is set to Block

B.  

SONAR is set to block host file modifications.

C.  

Tamper Protection is preventing Notepad from modifying the host file.

D.  

System Lockdown is enabled.

Discussion 0
Question # 18

Which protection engine should an administrator enable in order to drop malicious vulnerability scans against a client system?

Options:

A.  

SONAR

B.  

Intrusion Prevention

C.  

Application and Device Control

D.  

Tamper Protection

Discussion 0
Question # 19

Which protection technology can detect botnet command and control traffic generated on the Symantec Endpoint Protection client machine?

Options:

A.  

Intrusion Prevention

B.  

Insight

C.  

Risk Tracer

D.  

SONAR

Discussion 0
Question # 20

A user is unknowingly about to connect to a malicious website and download a known threat within a .rar file. All Symantec Endpoint Protection technologies are installed on the client's system.

In which feature set order must the threat pass through to successfully infect the system?

Options:

A.  

Download Insight, Firewall, IPS

B.  

Firewall, IPS, Download Insight

C.  

IPS, Firewall, Download Insight

D.  

Download Insight, IPS, Firewall

Discussion 0
Get 250-428 dumps and pass your exam in 24 hours!

Free Exams Sample Questions