What does the Configuration Design section in the SES Complete Solution Design provide?

What does the Configuration Design section in the SES Complete Solution Design provide?A . A summary of the features and functions to be implementedB . A sequential list of testing scenarios in production environmentsC . The validation of the SES complete solutionD . To review the base architecture and infrastructure...

April 15, 2025 No Comments READ MORE +

What is a reason to choose a single site design for a SEP on-premise architecture?

What is a reason to choose a single site design for a SEP on-premise architecture?A . Geographic coverageB . Legal constraints on log retentionC . Centralized reporting with no delayD . Control over WAN usageView AnswerAnswer: C Explanation: A single site design in a SEP on-premise architecture is often chosen...

April 12, 2025 No Comments READ MORE +

Which two options are available when configuring DNS change detected for SONAR? (Select two.)

Which two options are available when configuring DNS change detected for SONAR? (Select two.)A . BlockB . Active ResponseC . QuarantineD . LogE . TraceView AnswerAnswer: AD Explanation: When configuring DNS change detection for SONAR, two available options are Block and Log. These options allow administrators to define how SONAR...

April 2, 2025 No Comments READ MORE +

Which two are policy types within the Symantec Endpoint Protection Manager? (Select two.)

Which two are policy types within the Symantec Endpoint Protection Manager? (Select two.)A . ExceptionsB . Host ProtectionC . Shared InsightD . Intrusion PreventionE . Process ControlView AnswerAnswer: AD Explanation: Within Symantec Endpoint Protection Manager (SEPM), Exceptions and Intrusion Prevention are two policy types that can be configured to manage...

March 28, 2025 No Comments READ MORE +

What should be done with the gathered business and technical objectives in the Assess phase?

What should be done with the gathered business and technical objectives in the Assess phase?A . List them and rank them by priorityB . Document them and proceed with the assessment of the solutionC . Discuss them with the IT staff onlyD . Create a separate report for each objectiveView...

March 1, 2025 No Comments READ MORE +

Which two criteria should an administrator use when defining Location Awareness for the Symantec Endpoint Protection (SEP) client? (Select two.)

Which two criteria should an administrator use when defining Location Awareness for the Symantec Endpoint Protection (SEP) client? (Select two.)A . NIC descriptionB . SEP domainC . Geographic locationD . WINS serverE . Network SpeedView AnswerAnswer: AD Explanation: When defining Location Awareness for the Symantec Endpoint Protection (SEP) client, administrators...

February 28, 2025 No Comments READ MORE +

Where can you submit evidence of malware not detected by Symantec products?

Where can you submit evidence of malware not detected by Symantec products?A . SymProtect Cases PageB . Virus Definitions and Security Update PageC . SymSubmit PageD . Symantec Vulnerability Response pageView AnswerAnswer: C Explanation: The SymSubmit Page is the designated platform for submitting evidence of malware not detected by Symantec...

February 26, 2025 No Comments READ MORE +

Where can information about the validation of in-use features/functions be found during the Manage phase?

Where can information about the validation of in-use features/functions be found during the Manage phase?A . Solution Infrastructure DesignB . Solution Configuration DesignC . Test PlanD . Business or Technical ObjectivesView AnswerAnswer: C Explanation: In the Manage phase, information about the validation of in-use features/functions can be found in the...

February 24, 2025 No Comments READ MORE +

When a SEPM is enrolled in ICDm which policy can only be managed from the cloud?

When a SEPM is enrolled in ICDm which policy can only be managed from the cloud?A . FirewallB . Network Intrusion PreventionC . LiveUpdateD . Intensive ProtectionView AnswerAnswer: B Explanation: When the Symantec Endpoint Protection Manager (SEPM) is enrolled in the Integrated Cyber Defense Manager (ICDm), certain policies are exclusively...

February 24, 2025 No Comments READ MORE +

What permissions does the Security Analyst Role have?

What permissions does the Security Analyst Role have?A . Search endpoints, trigger dumps, create policiesB . Trigger dumps, get and quarantine files, enroll new sitesC . Search endpoints, trigger dumps, get and quarantine filesD . Trigger dumps, get and quarantine files, create device groupsView AnswerAnswer: C Explanation: In Endpoint Security...

February 22, 2025 No Comments READ MORE +