250-561 Demo and Sample
Note: Answers are below each question.
Samples are taken from full version.
Latest 250-561 Exam Questions and Practice Tests 2024 - Killexams.com
250-561 Dumps
250-561 Braindumps
250-561 Real Questions
250-561 Practice Test
250-561 Actual Questions
Symantec
250-561
Endpoint Security Complete - Administration R1
https://killexams.com/pass4sure/exam-detail/250-561
Question: 6
What is the primary issue pertaining to managing roaming users while utilizing an on-premise solution?
The endpoint is missing timely policy update
The endpoint is absent of the management console
The endpoint fails to receive content update
The endpoint is more exposed to threats
Answer: C Question: 7
Which SES security control protects against threats that may occur in the Impact phase?
Device Control
IPS
Antimalware
Firewall
Answer: D Question: 8
An administrator learns of a potentially malicious file and wants to proactively prevent the file from ever being executed.
What should the administrator do?
Add the file SHA1 to a blacklist policy
Increase the Antimalware policy Intensity to Level 5
Add the filename and SHA-256 hash to a Blacklist policy
Adjust the Antimalware policy age and prevalence settings
Answer: D Question: 9
Which SEPM-generated element is required for an administrator to complete the enrollment of SEPM to the cloud console?
Token
SEPM password
Certificate key pair
SQL password
Answer: A Question: 10
An administrator must create a custom role in ICDm.
Which area of the management console is able to have access restricted or granted?
Policy Management
Hybrid device management
Agent deployment
Custom Dashboard Creation
Answer: C Question: 11
Which Endpoint > Setting should an administrator utilize to locate unmanaged endpoints on a network subnet?
Discover Endpoints
Endpoint Enrollment
Discover and Deploy
Device Discovery
Answer: A Question: 12
What should an administrator know regarding the differences between a Domain and a Tenant in ICDm?
A tenant can contain multiple domains
A domain can contain multiple tenants
Each customer can have one domain and many tenant
Each customer can have one tenant and many domains
Answer: A Question: 13
Which Anti-malware technology should an administrator utilize to expose the malicious nature of a file created with a custom packet?
Sandbox
SONAR
Reputation
Emulator
Answer: A Question: 14
An administrator selects the Discovered Items list in the ICDm to investigate a recent surge in suspicious file activity. What should an administrator do to display only high risk files?
Apply a list control
Apply a search rule
Apply a list filter
Apply a search modifier
Answer: B Question: 15
What characterizes an emerging threat in comparison to traditional threat?
Emerging threats use new techniques and 0-day vulnerability to propagate.
Emerging threats requires artificial intelligence to be detected.
Emerging threats are undetectable by signature based engines.
Emerging threats are more sophisticated than traditional threats.
Answer: A Question: 16
Which technique randomizes the e memory address map with Memory Exploit Mitigation?
SEHOP
ROPHEAP
ASLR
ForceDEP
Answer: C Question: 17
In the ICDm, administrators are assisted by the My Task view. Which automation type creates the tasks within the console?
Artificial Intelligence
Machine Learning
Advanced Machine Learning
Administrator defined rules
Answer: A Question: 18
What is the frequency of feature updates with SES and the Integrated Cyber Defense Manager (ICDm)
Monthly
Weekly
Quarterly
Bi-monthly
Answer: B
Question: 19
A user downloads and opens a PDF file with Adobe Acrobat. Unknown to the user, a hidden script in the file begins downloading a RAT.
Which Anti-malware engine recognizes that this behavior is inconsistent with normal Acrobat functionality, blocks the behavior and kills Acrobat?
SONAR
Sapient
IPS
Emulator
Answer: B Question: 20
Which alert rule category includes events that are generated about the cloud console?
Security
Diagnostic
System
Application Activity
Answer: A Question: 21
Which Firewall Stealth setting prevents OS fingerprinting by sending erroneous OS information back to the attacker?
Disable OS fingerprint profiling
Disable OS fingerprint detection
Enable OS fingerprint masqueradi
Enable OS fingerprint protection
Answer: C Question: 22
An administrator is evaluating an organization's computers for an upcoming SES deployment. Which computer meets the pre-requisites for the SES client?
A computer running Mac OS X 10.8 with 500 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processor
A computer running Mac OS X 10.14 with 400 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processor
A computer running Windows 10 with 400 MB of disk space, 2 GB of RAM, and a 2.4 GHz Intel Pentium 4 processor
A computer running Windows 8 with 380 MB of disk space, 2 GB of RAM, and a 2.8 GHz Intel Pentium 4 processor
Answer: C Question: 23
Which two (2) steps should an administrator take to guard against re-occurring threats? (Select two)
Confirm that daily active and weekly full scans take place on all endpoints
Verify that all endpoints receive scheduled Live-Update content
Use Power Eraser to clean endpoint Windows registries
Add endpoints to a high security group and assign a restrictive Antimalware policy to the group
Quarantine affected endpoints
Answer: A,C,E Question: 24
After editing and saving a policy, an administrator is prompted with the option to apply the edited policy to any assigned device groups.
What happens to the new version of the policy if the administrator declines the option to apply it?
The policy display is returned to edit mode
The new version of the policy is deleted
An unassigned version of the policy is created
The new version of the policy is added to the "in progress" list
Answer: A Question: 25
What does SES's advanced search feature provide when an administrator searches for a specific term?
A search modifier dialog
A search wizard dialog
A suggested terms dialog
A search summary dialog
Answer: A Question: 26
Which device page should an administrator view to track the progress of an issued device command?
Command Status
Command History
Recent Activity
Activity Update
Answer: C Question: 27
What must an administrator check prior to enrolling an on-prem SEPM infrastructure into the cloud?
Clients are running SEP 14.2 or later
Clients are running SEP 14.1.0 or later
Clients are running SEP 12-6 or later
Clients are running SEP 14.0.1 or late
Answer: D Question: 28
Which type of organization is likely to be targeted with emerging threats?
Small organization with externalized managed security
Large organizations with dedicated security teams
Large organization with high turnover
Small organization with little qualified staff
Answer: D
6$03/( 48(67,216
7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV
.LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP
$FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP
([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP
3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV
*XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV
8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV
7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\
'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU
.LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG
View Practice Questions »