Which type of security threat is used by attackers to exploit vulnerable applications?
The SES Intrusion Prevention System has blocked an intruder's attempt to establish an IRC connection inside the firewall. Which Advanced Firewall Protection setting should an administrator enable to prevent the intruder's system from communicating with the network after the IPS detection?
Which antimalware intensity level is defined by the following: "Blocks files that are most certainly bad or potentially bad files results in a comparable number of false positives and false negatives."
What EDR function minimizes the risk of an endpoint infecting other resources in the environment?
Which type of communication is blocked, when isolating the endpoint by clicking on the isolate button in SEDR?
The Behavioral Heat Map indicates that a specific application and a specific behavior are never used together. What action can be safely set for the application behavior in a Behavioral Isolation policy?
Which two (2) instances could cause Symantec Endpoint Protection to be unable to remediate a file? (Select two.)
Which Incident View widget shows the parent-child relationship of related security events?
How should an administrator set up an alert to be notified when manual remediation is needed on an endpoint?
Which Endpoint Setting should an administrator utilize to locate unmanaged endpoints on a network subnet?
Which Firewall rule components should an administrator configure to blockfacebook.comuse during business hours?
In what order should an administrator configure the integration between SEDR and Symantec Endpoint Protection in order to maximize their benefits?
An organization identifies a threat in its environment and needs to limit the spread of the threat. How should the SEP Administrator block the threat using Application and Device Control?
The Security Status on the console home page is failing to alert a Symantec Endpoint Protection (SEP) administrator when virus definitions are out of date.
How should the SEP administrator enable the Security Status alert?
What feature is used to get a comprehensive picture of infected endpoint activity?
What does an end-user receive when an administrator utilizes the Invite User feature to distribute the SES client?
Using a hybrid environment, if a SEPM-managed endpoint cannot connect to the SEPM, how quickly can an administrator receive a security alert if the endpoint is using a public hot-spot?
Which rule types should be at the bottom of the list when an administrator adds device control rules?
Which option should an administrator utilize to temporarily or permanently block a file?
Which Symantec Endpoint Protection technology blocks a downloaded program from installing browser plugins?
How would an administrator specify which remote consoles and servers have access to the management server?
Which SES advanced feature detects malware by consulting a training model composed of known good and known bad files?
What prevention technique does Threat Defense for Active Directory use to expose attackers?
If an administrator enables the setting to manage policies from the cloud, what steps must be taken to reverse this process?
A user is unknowingly about to connect to a malicious website and download a known threat within a .rar file. All Symantec Endpoint Protection technologies are installed on the client's system.
In which feature set order must the threat pass through to successfully infect the system?
An Incident Responder has determined that an endpoint is compromised by a malicious threat. What SEDR feature would be utilized first to contain the threat?
Which statement demonstrates how Symantec EDR hunts and detects IoCs in the environment?