Which Symantec Endpoint Protection 12.1 protection technology provides the primary protection layers against zero-day network attacks? A. SONAR B. Client Firewall C. Intrusion Prevention D. System Lockdown Explanation: Show Answer
Category: 250-315
Administration of Symantec Endpoint Protection 12.1
According to Symantec, what is a botnet?
According to Symantec, what is a botnet? A. systems infected with the same virus strain B. groups of systems performing remote tasks without the users’ knowledge C. groups of computers configured to steal credit card records D. compromised systems opening communication to an IRC channel Explanation: Show Answer
Which Symantec Endpoint Protection 12.1 protection technology will be prevented from working on
A financial company has a security policy that prevents banking system workstations from connecting to the internet. Which Symantec Endpoint Protection 12.1 protection technology will be prevented from working on the company’s workstations? A. Insight B. Application and Device Control C. Network Threat Protection D. LiveUpdate Explanation: "Pass Any Exam. Any Time." – www.actualtests.com 2 […]
How does the Intrusion Prevention System add an additional layer of protection to Network Threat
How does the Intrusion Prevention System add an additional layer of protection to Network Threat Protection? A. It inspects the TCP packet headers and tracks the sequence number. B. It performs deep packet inspection, reading the packet headers, and data portion. C. It examines TCP/IP traffic from the application and traces the source of the […]
Which SONAR sub-feature can block new variants of the same family, based on sequence of events?
The fake antivirus family "PC scout" infects systems with a similar method regardless of its variant. Which SONAR sub-feature can block new variants of the samefamily, based on sequence of events? A. artificial intelligence B. behavioral heuristic C. human authored signatures D. behavioral policy lockdown Explanation: Show Answer
Which Symantec Endpoint Protection 12.1 protection technology blocks such obfuscated attacks?
Drive-by downloads are a common vector of infections. Some of these attacks use encryption to bypass traditional defense mechanisms. Which Symantec EndpointProtection 12.1 protection technology blocks such obfuscated attacks? A. SONAR B. Bloodhound heuristic virus detection C. Client Firewall D. Browser Intrusion Prevention Explanation: Show Answer
Which Symantec Endpoint Protection 12.1 defense mechanism provides protection against worms like
Which Symantec Endpoint Protection 12.1 defense mechanism provides protection against worms like W32.Silly.FDC, which propagate from system to systemthrough the use of autorun.inf files? A. Application Control B. SONAR C. Client Firewall D. Exceptions Explanation: Show Answer
Which Symantec Endpoint Protection 12.1 component uses reputation to evaluate a file?
Which Symantec Endpoint Protection 12.1 component uses reputation to evaluate a file? A. Shared Insight Cache server B. Symantec Endpoint Protection client C. Symantec Endpoint Protection Manager D. LiveUpdate Administrator server Explanation: Show Answer
Which Symantec Endpoint Protection 12.1 component provides services to improve the performance of
Which Symantec Endpoint Protection 12.1 component provides services to improve the performance of virtual client scanning? A. Shared Insight Cache server B. LiveUpdate Administrator server C. Symantec Protection Center D. Group Update Provider Explanation: Show Answer
How many Symantec Endpoint Protection Managers can be connected to an embedded database?
How many Symantec Endpoint Protection Managers can be connected to an embedded database? A. 1 B. 2 C. 5 D. 10 "Pass Any Exam. Any Time." – www.actualtests.com 5 Explanation: Show Answer