250-561 Endpoint Security Complete - Administration R1 Questions and Answers
In the ICDm, administrators are assisted by the My Task view. Which automation type creates the tasks within the console?
Which IPS Signature type is Primarily used to identify specific unwanted traffic?
A user downloads and opens a PDF file with Adobe Acrobat. Unknown to the user, a hidden script in the file begins downloading a RAT.
Which Anti-malware engine recognizes that this behavior is inconsistent with normal Acrobat functionality, blocks the
behavior and kills Acrobat?
Which type of security threat is used by attackers to exploit vulnerable applications?
Which alert rule category includes events that are generated about the cloud console?
Which policy should an administrator edit to utilize the Symantec LiveUpdate server for pre-release content?
An administrator learns of a potentially malicious file and wants to proactively prevent the file from ever being executed.
What should the administrator do?
Which security control is complementary to IPS, providing a second layer of protection against network attacks?
Which two (2) steps should an administrator take to guard against re-occurring threats? (Select two)
Which URL is responsible for notifying the SES agent that a policy change occurred in the cloud console?
An endpoint fails to retrieve content updates.
Which URL should an administrator test in a browser to determine if the issue is network related?
An administrator suspects that several computers have become part of a botnet. What should the administrator do to detect botnet activity on the network?
An endpoint is offline, and the administrator issues a scan command. What happens to the endpoint when it restarts, if it lacks connectivity?
Which report template type should an administrator utilize to create a daily summary of network threats detected?
