Employees of an accounting company often take their notebooks to customer sites. The administrator needs to apply a different firewall policy when the notebooks are disconnected from the accounting company's network.
What must the administrator configure to use the two different policies?
Which two criteria are used by Symantec Insight to evaluate binary executables? (Select two.)
A Symantec Endpoint Protection administrator needs to comply with a service level agreement stipulating that all definitions must be internally quality assurance tested before being deployed to customers.
Which step should the administrator take?
Which object in the Symantec Endpoint Protection Manager console describes the most granular level to which a policy can be assigned?
Which setting can an administrator configure in the LiveUpdate policy?
Which protection technology can detect botnet command and control traffic generated on the Symantec Endpoint Protection client machine?
An administrator reports that the Home, Monitors, and Report pages are absent in the Symantec Endpoint Protection Management console when the administrator logs on.
Which action should the administrator perform to correct the problem?
Which two criteria can an administrator use to determine hosts in a host group? (Select two.)
An administrator is recovering from a Symantec Endpoint Manager (SEPM) site failure.
Which file should the administrator use during an install of SEPM to recover the lost environment according to Symantec Disaster Recovery Best Practice documentation?
Where can an administrator obtain the Sylink.xml file?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
Symantec Free Exams |
---|
![]() |