Which rule types should be at the bottom of the list when an administrator adds device control rules?
Files are blocked by hash in the deny list policy. Which algorithm is supported, in addition to MD5?
How are Insight results stored?
If an administrator enables the setting to manage policies from the cloud, what steps must be taken to reverse this process?
An organization identifies a threat in its environment and needs to limit the spread of the threat. How should the SEP Administrator block the threat using Application and Device Control?
Which SES feature helps administrators apply policies based on specific endpoint profiles?
What should an administrator utilize to identify devices on a Mac?
An organization would like to use a content distribution method that centrally controls content types and versions. Almost all of their endpoints are running Windows.
What type of content distribution method should be used?
Which two (2) scan range options are available to an administrator for locating unmanaged endpoints? (Select two)
What feature is used to get a comprehensive picture of infected endpoint activity?
What is the maximum number of SEPMs a single Management Platform is able to connect to?
When a SEPM is enrolled in ICDm, which policy can only be managed from the cloud?
What does the MITRE ATT&CK Matrix consist of?
Which two (2) criteria are used by Symantec Insight to evaluate binary executables? (Select two.)
What are the two (2) locations where an Incident Responder should gather data for an After Actions Report in SEDR? (Select two)
Which option should an administrator utilize to temporarily or permanently block a file?
The LiveUpdate Download Schedule is set to the default on the Symantec Endpoint Protection Manager (SEPM).
How many content revisions must the SEPM keep to ensure clients that check in to the SEPM every 10 days receive xdelta content packages instead of full content packages?
Which Discover and Deploy process requires the LocalAccountTokenFilterPolicy value to be added to the Windows registry of endpoints, before the process begins?
Which type of event does operation:1indicate in a SEDR database search?
What is an appropriate use of a file fingerprint list?
A file has been identified as malicious.
Which feature of SEDR allows an administrator to manually block a specific file hash?
How does IPS check custom signatures?
Which two (2) security controls are utilized by an administrator to mitigate threats associated with the Discovery phase? (Select two)
What is an appropriate use of a file fingerprint list?
Which type of security threat continues to threaten endpoint security after a system reboot?
What does a ranged query return or exclude?
What should an administrator know regarding the differences between a Domain and a Tenant in ICDm?
An administrator is troubleshooting a Symantec Endpoint Protection (SEP) replication.
Which component log should the administrator check to determine whether the communication between the two sites is working correctly?
What information is required to calculate storage requirements?
An organization recently experienced an outbreak and is conducting a health check of the environment. What Protection Technology can the SEP team enable to control and monitor the behavior of applications?
Why is Active Directory a part of nearly every targeted attack?
What does the Endpoint Communication Channel (ECC) 2.0 allow Symantec EDR to directly connect to?
What does an Endpoint Activity Recorder (EAR) full dump consist of?
A Symantec Endpoint Protection (SEP) administrator receives multiple reports that machines are experiencing performance issues. The administrator discovers that the reports happen at about the same time as the scheduled LiveUpdate.
Which setting should the SEP administrator configure to minimize I/O when LiveUpdate occurs?
Which Incident View widget shows the parent-child relationship of related security events?
Which alert rule category includes events that are generated about the cloud console?
Which default role has the most limited permission in the Integrated Cyber Defense Manager?
Which client log shows that a client is downloading content from its designated source?
What does a medium-priority incident indicate?
What happens when an administrator adds a file to the deny list?
What is a feature of Cynic?
The SES Intrusion Prevention System has blocked an intruder's attempt to establish an IRC connection inside the firewall. Which Advanced Firewall Protection setting should an administrator enable to prevent the intruder's system from communicating with the network after the IPS detection?
When a SEPM is enrolled in ICDm, which policy can only be managed from the cloud?
What is the function of Symantec Insight?
When are events generated within SEDR?