Symantec Endpoint Protection Quiz

Symantec Endpoint Protection Quiz

 



Symantec Endpoint Protection Quiz contain set of 10 MCQ questions for Symantec Endpoint Protection MCQ which will help you to clear beginner level quiz.



1. A company recently installed a proxy server and configured firewall rules to allow only HTTP traffic through the perimeter firewall. Since the change, Symantec Endpoint Protection 12.1 is unable to receive updates.
Which step must be taken on the Symantec Endpoint Protection Manager to receive updates?
a. Configure proxy settings within Internet Explorer under Internet Options.
b. Configure proxy settings under Server Properties.
c. Configure proxy settings within the External Communication Settings.
d. Configure proxy settings in the LiveUpdate policy.
Ans: b

2.  An administrator plans to make a duplicate of an existing policy and modify it for use on a test client in the Symantec Endpoint Protection Manager (SEPM).What is the quickest and simplest way to duplicate the existing policy?
a. Copy and paste the policy’s XML file on the SEPM and log back in to the console.
b. Copy and paste the policy’s XML file on the SEPM and restart the SEPM services.
c. In the SEPM console’s Policy page, copy the policy, and then paste the policy.
d. Add a new client with inheritance turned off, then modify the policy.
Ans: c
 
3. What has the greatest impact on the size of the Symantec Endpoint Protection Manager database?
a. number of content revisions
b. number of log entries
c. number of users
d. number of backups to keep
Ans: b
 
4. What is the first step an administrator must complete in order to integrate Active Directory with Symantec Endpoint Protection 12.1?
a. Import a Security Group or a Distribution Group.
b. Import an Organizational Unit (OU), User Object, or Computer Object.
c. Add the Active Directory server to the Symantec Endpoint Protection Site.
d. Add the Active Directory server to a Symantec Endpoint Protection Manager.
Ans: d
 
5. Which two methods can be used to identify the target machines to which the Symantec Endpoint Protection client can be installed when using the Client Deployment Wizard? (Select two.)
a. Browse through Windows networking.
b. Import a file containing IP addresses.
c. Specify a UNC path.
d. Import a file from the Unmanaged Detector.
e. Enable the ARP Discovery feature.
Ans: a, b
 
6.  When Auto-Protect is enabled, protection is optional for which type of file access?
a. access
b. modify
c. backup
d. restore
Ans: c
 
7. In addition to performance improvements, which two benefits does Insight provide?
a. reputation scoring for documents
b. zero day threat detection
c. Protect against malicious java scripts
d. False positive mitigation
e. blocking of malicious websites
Ans: b, d
 
8.  How does the Intrusion Prevention System add an additional layer of protection to Network Threat Protection?
a. It inspects the TCP packet headers and tracks the sequence number.
b. It performs deep packet inspection, reading the packet headers, and data portion.
c. It examines TCP/IP traffic from the application and traces the source of the traffic.
d. It monitors IP datagrams for abnormalities.
 Ans: b
 
9.      Which Symantec Endpoint Protection 12.1 defense mechanism provides protection against worms like W32.Silly.FDC, which propagate from system to system through the use of autorun.inf files?
a.  Application Control
b.  SONAR
c.  Client Firewall
d.  Exceptions 
Ans: a
 
10.  Which Symantec Endpoint Protection 12.1 component provides services to improve the performance of virtual client scanning?
a. Shared Insight Cache server
 b. LiveUpdate Administrator server
c. Symantec Protection Center
d. Group Update Provider

Ans: a

11.  How many Symantec Endpoint Protection Managers can be connected to an embeddeddatabase?
a. 1
b.2
c. 5
d. 10
Ans: a