Symantec Certified Specialist (SCS) 250-428 exam dumps

Symantec 250-428 exam is one of the popular Symantec Certified Specialist (SCS) certification exams, which verify that the candidates will demonstrate an understanding of the planning, designing, deploying and optimization of Symantec Endpoint Protection. Are you also preparing for Symantec 250-428 exam? Just come to choose Symantec Certified Specialist (SCS) 250-428 exam dumps as the preparation materials to make sure you can pass 250-428 Administration of Symantec Endpoint Protection 14 exam successfully.

Free 250-428 Exam Dumps Online For Checking:

1. A Symantec Endpoint Protection (SEP) administrator receives multiple reports that machines are experiencing performance issues. The administrator discovers that the reports happen about the same time as the scheduled LiveUpdate.

Which setting should the SEP administrator configure to minimize I/O when LiveUpdate occurs?

2. Which action must a Symantec Endpoint Protection administrator take before creating custom Intrusion Prevention signatures?

3. Which tool should the administrator run before starting the Symantec Endpoint Protection Manager upgrade as a Symantec Best Practice?

4. A company allows users to create firewall rules. During the course of business, users are accidentally adding rules that block a custom internal application.

Which steps should the Symantec Endpoint Protection administrator take to prevent users from blocking the custom application?

5. Which action does SONAR take before convicting a process?

6. An administrator is re-adding an existing Replication Partner to the local Symantec Endpoint Protection Manager site.

Which two parameters are required to re-establish this replication partnership? (Select two.)

7. A company uses a remote administration tool that is detected and quarantined by Symantec Endpoint Protection (SEP).

Which step can an administrator perform to continue using the remote administration tool without detection by SEP?

8. A Symantec Endpoint Protection (SEP) administrator performed a disaster recovery without a database backup.

In which file should the SEP administrator add "scm.agent.groupcreation=true" to enable the automatic creation of client groups?

9. Why does Power Eraser need Internet access?

10. Refer to the exhibit.

In the use case displayed in the exhibit, why is Notepad unable to save the changes to this file?

11. Which package type should an administrator use to reduce a SEP environment's footprint when considering that new SEP 14 clients will be installed on point of sale terminals?

12. Fill in the Blank

An administrator plans to implement a multi-site Symantec Endpoint Protection (SEP) deployment. The administrator needs to determine whether replication is viable without having to make network firewall changes or change defaults in SEP.

Which port should the administrator verify is open on the path of communication between the two proposed sites? (Type the port number.)

13. A company needs to configure an Application and Device Control policy to block read/write access to all USB removable media on its Symantec End point Protection (SLP) systems.

Which tool should an administrator use to format the GUID and device IDs as required by SEP?

14. An administrator is recovering from a Symantec Endpoint Manager (SEPM) site failure.

Which file should the administrator use during an install of SEPM to recover the lost environment according to Symantec Disaster Recovery Best Practice documentation?

15. DRAG DROP

An administrator is unknowingly trying to connect to a malicious website and download a known threat within a .rar file. All Symantec Endpoint Protection technologies are installed on the client's system.

Drag and drop the technologies to the right side of the screen in the sequence necessary to block or detect the malicious file.

16. What are two criteria that Symantec Insight uses to evaluate binary executables? (Select two.)

17. What happens when the license expires in Symantec Endpoint Protection 14 enterprise Edition?

18. Which two are policy types within the Symantec Endpoint Protection Manager? (Select two.)

19. An administrator configures the scan duration for a scheduled scan.The scan fails to complete in the specified time period.

When will the next scheduled scan occur on the computer?

20. A company deploys Symantec Endpoint Protection client to its sales staff who travel across the country.

Which deployment method should the company use to notify its sales staff to install the client?


 

Pass Symantec 250-430 Exam With New Dumps Questions
Symantec Certification 250-430 Exam Dumps

Add a Comment

Your email address will not be published. Required fields are marked *