Weekend Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 2493360325

Good News !!! 250-428 Administration of Symantec Endpoint Protection 14 is now Stable and With Pass Result

250-428 Practice Exam Questions and Answers

Administration of Symantec Endpoint Protection 14

Last Update 4 days ago
Total Questions : 135

Administration of Symantec Endpoint Protection 14 is stable now with all latest exam questions are added 4 days ago. Incorporating 250-428 practice exam questions into your study plan is more than just a preparation strategy.

By familiarizing yourself with the Administration of Symantec Endpoint Protection 14 exam format, identifying knowledge gaps, applying theoretical knowledge in Symantec practical scenarios, you are setting yourself up for success. 250-428 exam dumps provide a realistic preview, helping you to adapt your preparation strategy accordingly.

250-428 exam questions often include scenarios and problem-solving exercises that mirror real-world challenges. Working through 250-428 dumps allows you to practice pacing yourself, ensuring that you can complete all Administration of Symantec Endpoint Protection 14 exam questions within the allotted time frame without sacrificing accuracy.

250-428 PDF

250-428 PDF (Printable)
$48
$119.99

250-428 Testing Engine

250-428 PDF (Printable)
$56
$139.99

250-428 PDF + Testing Engine

250-428 PDF (Printable)
$70.8
$176.99
Question # 1

An organization is troubleshooting a false positive detection with WS.Respulation.1 Signature on an unmanaged SEP client.

What are the steps to create an exclusion on the unmanaged SEP Client?

Options:

A.  

In the Symantec Endpoint Protection Client, click on View logs and select Virus And SEP ware Protection -> View Logs> Open the Risk Log and Select the log entry for the false positive. Click Export.

B.  

In the Symantec Endpoint Protection Client, client on Change Settings and select Exceptions -> Configure Settings. Choose Add and select SONAR Exception.

C.  

In the Symantec Endpoint Protection Client, client on Change Settings and selects Exceptions -> Configure Settings. Choose Add and select Security Exception.

D.  

In the Symantec Endpoint Protection Client, client on Change Settings and select Exceptions -> Configure Settings. Choose Add and select Application Exception.

Discussion 0
Question # 2

What is a function of Symantec Insight?

Options:

A.  

Provides reputation ratings for binary executables

B.  

Enhances the capability of Group Update Providers (GUP)

C.  

Provides reputation ratings for structured data

D.  

Increases the efficiency and effectiveness of LiveUpdate

Discussion 0
Question # 3

Which task is unavailable for administrative accounts that authenticate using RSA SecurID Authentication?

Options:

A.  

reset forgotten passwords

B.  

import organizational units (OU) from Active Directory

C.  

configure external logging

D.  

enable Session Based Authentication with Web Services

Discussion 0
Question # 4

A company needs to configure an Application and Device Control policy to block read/write access to all USB removable media on its Symantec Endpoint Protection (SEP) systems.

Which tool should an administrator use to format the GUID and device IDs as required by SEP?

Options:

A.  

CheckSum.exe

B.  

DeviceTree.exe

C.  

TaskMgr.exe

D.  

DevViewer.exe

Discussion 0
Question # 5

Which tool should an administrator use to discover and deploy the Symantec Endpoint Protection client to new computers?

Options:

A.  

Unmanaged Detector

B.  

Client Deployment Wizard

C.  

Communication Update Package Deployment

D.  

Symantec Endpoint Discovery Tool

Discussion 0
Question # 6

Which task should an administrator perform to troubleshoot operation of the Symantec Endpoint Protection embedded database?

Options:

A.  

Verify the sqlserver.exe service is running on port 1433

B.  

Verify that dbsrv11.exe is listening on port 2638

C.  

Check the database transaction logs in X:\Program Files\Microsoft SQL server

D.  

Check whether the MSSQLSERVER service is running

Discussion 0
Question # 7

Which step is unnecessary when an administrator creates an application rule set?

Options:

A.  

define a provider

B.  

select a process to apply

C.  

select a process to exclude

D.  

define rule order

Discussion 0
Question # 8

Which action can an administrator take to improve the Symantec Endpoint Protection Manager (SEPM) dashboard performance and report accuracy?

Options:

A.  

Rebuilding database indexes

B.  

Lowering the client installation log entries

C.  

Limiting the number of backups to keep

D.  

Decreasing the number of content revisions to keep

Discussion 0
Question # 9

An organization has several remote location with minimum bandwidth and would like to use a content distribution method that does NOT involve configuring as internal LiveUpdate server.

What content distribution method should be utilized?

Options:

A.  

External LiveUpdate

B.  

Management Server

C.  

Intelligent Updater

D.  

Group Update Provider

Discussion 0
Question # 10

An organization recently experienced a definition storm where clients downloaded full definition packages from the management server.

Where can the SEPM increase the amount of content revisions so that clients with older content can get delta updates?

Options:

A.  

Click on Policies and select LiveUpdate. Edit the LiveUpdate Content policy.

B.  

Edit the Site Properties and under the LiveUpdate tab, edit the amount of content revisions to keep.

C.  

Click on Policies and select LiveUpdate. Edit the LiveUpdate Settings policy.

D.  

Edit the Server Properties and under the LiveUpdate tab, edit the amount of content revisions to keep.

Discussion 0
Question # 11

Which settings can impact the Files trusted count?

Question # 11

Options:

A.  

System Lockdown Whitelist in the Application and Device Control Policy

B.  

File Cache settings in the Virus and Spyware Protection policy

C.  

Insight settings in the Virus and Spyware Protection policy

D.  

SONAR settings in the Virus and Spyware Protection policy

Discussion 0
Question # 12

A Symantec Endpoint Protection (SEP) administrator is remotely deploying SEP clients, but the clients are failing to install on Windows XP.

What are two possible reasons for preventing installation? (Select two.)

Options:

A.  

Windows firewall is enabled.

B.  

Internet Connection firewall is disabled.

C.  

Administrative file shares are enabled.

D.  

Simple file sharing is enabled.

E.  

Clients are configured for DHCP.

Discussion 0
Question # 13

An administrator plans to implement a multi-site Symantec Endpoint Protection (SEP) deployment. The administrator needs to determine whether replication is viable without needing to make network firewall changes or change defaults in SEP.

Which port should the administrator verify is open on the path of communication between the two proposed sites?

Options:

A.  

1433

B.  

2967

C.  

8014

D.  

8443

Discussion 0
Question # 14

An administrator is recovering from a Symantec Endpoint Manager (SEPM) site failure.

Which file should the administrator use during an install of SEPM to recover the lost environment according to Symantec Disaster Recovery Best Practice documentation?

Options:

A.  

Original installation log

B.  

Sylink.xml file from the SEPM

C.  

Settings.properties file

D.  

Recovery_timestamp file

Discussion 0
Question # 15

An administrator selects the Backup files before attempting to repair the Remediations option in the Auto-Protect policies.

Which two actions occur when a virus is detected? (Select two.)

Options:

A.  

replace the file with a place holder

B.  

check the reputation

C.  

store in Quarantine folder

D.  

send the file to Symantec Insight

E.  

encrypt the file

Discussion 0
Question # 16

Match the following list of ports used by Symantec Endpoint Protection (SEP) to the defining characteristics by clicking and dragging the port on the left to the corresponding description on the right.

Question # 16

Options:

Discussion 0
Question # 17

Why is Notepad unable to save the changes to the file in the image below?

Question # 17

Options:

A.  

SONAR High Risk detection is set to Block

B.  

SONAR is set to block host file modifications.

C.  

Tamper Protection is preventing Notepad from modifying the host file.

D.  

System Lockdown is enabled.

Discussion 0
Question # 18

Which protection engine should an administrator enable in order to drop malicious vulnerability scans against a client system?

Options:

A.  

SONAR

B.  

Intrusion Prevention

C.  

Application and Device Control

D.  

Tamper Protection

Discussion 0
Question # 19

Which protection technology can detect botnet command and control traffic generated on the Symantec Endpoint Protection client machine?

Options:

A.  

Intrusion Prevention

B.  

Insight

C.  

Risk Tracer

D.  

SONAR

Discussion 0
Question # 20

A user is unknowingly about to connect to a malicious website and download a known threat within a .rar file. All Symantec Endpoint Protection technologies are installed on the client's system.

In which feature set order must the threat pass through to successfully infect the system?

Options:

A.  

Download Insight, Firewall, IPS

B.  

Firewall, IPS, Download Insight

C.  

IPS, Firewall, Download Insight

D.  

Download Insight, IPS, Firewall

Discussion 0
Get 250-428 dumps and pass your exam in 24 hours!

Free Exams Sample Questions