Symantec 250-550 Administration of Symantec Endpoint Security – R1 Online Training
Symantec 250-550 Online Training
The questions for 250-550 were last updated at Nov 19,2024.
- Exam Code: 250-550
- Exam Name: Administration of Symantec Endpoint Security – R1
- Certification Provider: Symantec
- Latest update: Nov 19,2024
What does an end-user receive when an administrator utilizes the Invite User feature to distribute the SES client?
- A . An email with a link to directly download the SES client
- B . An email with a link to a KB article explaining how to install the SES Agent
- C . An email with the SES_setup.zip file attached
- D . An email with link to register on the ICDm user portal
What version number is assigned to a duplicated policy?
- A . One
- B . Zero
- C . The original policy’s number plus one
- D . The original policy’s version numb
Which dashboard should an administrator access to view the current health of the environment?
- A . The Antimalware Dashboard
- B . The SES Dashboard
- C . The Device Integrity Dashboard
- D . The Security Control Dashboard
An administrator is evaluating an organization’s computers for an upcoming SES deployment .
Which computer meets the pre-requisites for the SES client?
- A . A computer running Mac OS X 10.8 with 500 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processor
- B . A computer running Mac OS X 10.14 with 400 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processor
- C . A computer running Windows 10 with 400 MB of disk space, 2 GB of RAM, and a 2.4 GHz Intel Pentium 4 processor
- D . A computer running Windows 8 with 380 MB of disk space, 2 GB of RAM, and a 2.8 GHz Intel Pentium 4 processor
In the ICDm, administrators are assisted by the My Task view .
Which automation type creates the tasks within the console?
- A . Artificial Intelligence
- B . Machine Learning
- C . Advanced Machine Learning
- D . Administrator defined rules
Which two (2) options is an administrator able to use to prevent a file from being fasely detected (Select two)
- A . Assign the file a SHA-256 cryptographic hash
- B . Add the file to a Whitelist policy
- C . Reduce the Intensive Protection setting of the Antimalware policy
- D . Register the file with Symantec’s False Positive database
- E . Rename the file
Which statement best describes Artificial Intelligence?
- A . A program that automates tasks with a static set of instructions
- B . A program that can predict when a task should be performed
- C . A program that is autonomous and needs training to perform a task
- D . A program that learns from experience and perform autonomous tasks
Which SES advanced feature detects malware by consulting a training model composed of known good and known bad fries?
- A . Signatures
- B . Advanced Machine Learning
- C . Reputation
- D . Artificial Intelligence
Which two (2) Discovery and Deploy features could an administrator use to enroll MAC endpoints? (Select two)
- A . Push Enroll
- B . A custom Installation package creator pact
- C . A default Direct Installation package
- D . Invite User
- E . A custom Direct installation package
Which SEPM-generated element is required for an administrator to complete the enrollment of SEPM to the cloud console?
- A . Token
- B . SEPM password
- C . Certificate key pair
- D . SQL password