What protection technology should an administrator enable to prevent double executable file names of ransomware variants like Cryptolocker from running?
What should an administrator utilize to identify devices on a Mac?
Which Indicator of Compromise might be detected as variations in the behavior of privileged users that indicate that their account is being used by someone else to gain a foothold in an environment?
Which client log shows that a client is downloading content from its designated source?
What does an Endpoint Activity Recorder (EAR) full dump consist of?
What happens when an administrator adds a file to the deny list?
Which action can an administrator take to improve the Symantec Endpoint Protection Manager (SEPM) dashboard performance and report accuracy?
An Incident Responder has determined that an endpoint is compromised by a malicious threat. What SEDR feature would be utilized first to contain the threat?
Which security control performs a cloud lookup on files downloaded during the Initial Access phase?
Which type of security threat continues to threaten endpoint security after a system reboot?
What feature is used to get a comprehensive picture of infected endpoint activity?
What is the maximum number of SEPMs a single Management Platform is able to connect to?
Which alert rule category includes events that are generated about the cloud console?
Which type of file attribute is valid for creating a block list entry with Symantec Endpoint Detection and Response (SEDR)?
Which IPS signature type is primarily used to identify specific unwanted network traffic?
What is a feature of Cynic?
Which protection technology can detect botnet command and control traffic generated on the Symantec Endpoint Protection client machine?
Which SES security control protects a user against data leakage if they encounter a man-in-the-middle attack?
What Threat Defense for Active Directory feature disables a process's ability to spawn another process, overwrite a part of memory, run recon commands, or communicate to the network?
What Symantec Best Practice is recommended when setting up Active Directory integration with the Symantec Endpoint Protection Manager?
Which other items may be deleted when deleting a malicious file from an endpoint?
What does the Endpoint Communication Channel (ECC) 2.0 allow Symantec EDR to directly connect to?
What must be entered before downloading a file from ICDm?
In what order should an administrator configure the integration between SEDR and Symantec Endpoint Protection in order to maximize their benefits?
What does the MITRE ATT&CK Matrix consist of?
An administrator decides to migrate an SES Complete hybrid environment to a fully cloud-managed one. After cleaning up on-premise group structure and policies. What is the next recommended step for migration?
When are events generated within SEDR?
After several failed logon attempts, the Symantec Endpoint Protection Manager (SEPM) has locked the default admin account. An administrator needs to make system changes as soon as possible to address an outbreak, but the admin account is the only account.
Which action should the administrator take to correct the problem with minimal impact on the existing environment?
Which antimalware intensity level is defined by the following: "Blocks files that are most certainly bad or potentially bad files results in a comparable number of false positives and false negatives."
Which two (2) instances could cause Symantec Endpoint Protection to be unable to remediate a file? (Select two.)
How are Insight results stored?
Administrators at a company share a single terminal for configuring Symantec Endpoint Protection. The administrators want to ensure that each administrator using the console is forced to authenticate using their individual credentials. They are concerned that administrators may forget to log off the terminal, which would easily allow others to gain access to the Symantec Endpoint Protection Manager (SEPM) console.
Which setting should the administrator disable to minimize the risk of non-authorized users logging into the SEPM console?
An organization recently experienced an outbreak and is conducting a health check of the environment. What Protection Technology can the SEP team enable to control and monitor the behavior of applications?
On which platform is LiveShell available?
How would an administrator specify which remote consoles and servers have access to the management server?
How does IPS check custom signatures?
Files are blocked by hash in the deny list policy. Which algorithm is supported, in addition to MD5?
What EDR function minimizes the risk of an endpoint infecting other resources in the environment?
What must be entered before downloading a file from ICDm?
Which EDR feature is used to search for real-time indicators of compromise?
What is the purpose of a Threat Defense for Active Directory Deceptive Account?
Which type of event does operation:1indicate in a SEDR database search?
Which designation should an administrator assign to the computer configured to find unmanaged devices?
Which Endpoint Setting should an administrator utilize to locate unmanaged endpoints on a network subnet?
Which technology can prevent an unknown executable from being downloaded through a browser session?