Download Symantec.250-428.PracticeTest.2019-08-17.73q.vcex

Download Exam

File Info

Exam Administration of Symantec Endpoint Protection 14
Number 250-428
File Name Symantec.250-428.PracticeTest.2019-08-17.73q.vcex
Size 660 KB
Posted Aug 17, 2019
Download Symantec.250-428.PracticeTest.2019-08-17.73q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

Which setting can an administrator configure in the LiveUpdate policy? 


  1. Linux Settings
  2. Frequency to download content.
  3. Specific content revision to download from a Group Update Provider (GUP)
  4. Specific content policies to download
Correct answer: B
Explanation:
References: https://support.symantec.com/en_US/article.TECH104435.html
References: https://support.symantec.com/en_US/article.TECH104435.html



Question 2

A Symantec Endpoint Protection Manager (SEPM) administrator notices performance issues with the SEPM server. The Client tab becomes unresponsive in the SEPM console and .DAT files accumulate in the “agentinfo” folder. 
Which tool should the administrator use to gather log files to submit to Symantec Technical Support?


  1. collectLog.cmd
  2. LogExport.exe
  3. smc.exe
  4. ExportLog.vbs
Correct answer: A
Explanation:
References: https://support.symantec.com/en_US/article.TECH105955.html
References: https://support.symantec.com/en_US/article.TECH105955.html



Question 3

Which two considerations must an administrator make when enabling Application Learning in an environment? (Select two.)


  1. Application Learning should be deployed on a small group of systems in the enterprise.
  2. Application Learning can generate significant CPU or memory use on a Symantec Endpoint Protection Manager.
  3. Application Learning is dependent on Insight.
  4. Application Learning requires a file fingerprint list to be created in advance.
  5. Application Learning can generate increased false positives.
Correct answer: AB
Explanation:
References: https://support.symantec.com/en_US/article.TECH134367.html
References: https://support.symantec.com/en_US/article.TECH134367.html



Question 4

Which task should an administrator perform to troubleshoot operation of the Symantec Endpoint Protection embedded database?


  1. Verify the sqlserver.exe service is running on port 1433
  2. Verify that dbsrv11.exe is listening on port 2638
  3. Check the database transaction logs in X:Program FilesMicrosoft SQL Server
  4. Check whether the MSSQLSERVER service is running
Correct answer: B
Explanation:
References: https://support.symantec.com/en_US/article.TECH160964.html
References: https://support.symantec.com/en_US/article.TECH160964.html



Question 5

An administrator notices that some entries list that the Risk was partially removed. The administrator needs to determine whether additional steps are necessary to remediate the threat. 
Where in the Symantec Endpoint Protection Manager console can the administrator find additional information on the risk?


  1. Infected and At Risk Computers report
  2. Risk log
  3. Notifications
  4. Computer Status report
Correct answer: B
Explanation:
References: https://support.symantec.com/en_US/article.TECH95543.html
References: https://support.symantec.com/en_US/article.TECH95543.html



Question 6

An administrator reports that the Home, Monitors, and Report pages are absent in the Symantec Endpoint Protection Management console when the administrator logs on. 
Which action should the administrator perform to correct the problem?


  1. Grant the Administrator Full Access to Root group of the organization
  2. Configure proxy settings for each server in the site
  3. Configure External Logging to Enable Transmission of Logs to a Syslog Server
  4. Grant View Reports permission to the administrator
Correct answer: D



Question 7

An administrator is reviewing an Infected Clients Report and notices that a client repeatedly shows the same malware detection. Although the client remediates the files, the infection continues to display in the logs. 
Which two functions should be enabled to automate enhanced remediation of a detected threat and its related side effects? (Select two.)


  1. Stop Service Automatically
  2. Stop and Reload AutoProtect
  3. Terminate Processes Automatically
  4. Risk Tracer
  5. Early Launch Anti-Malware Driver
Correct answer: AC



Question 8

A company deploys Symantec Endpoint Protection (SEP) to50 virtual machines running on a single ESXi host. 
Which configuration change can the administrator make to minimize sudden IOPS impact on the ESXi server while each SEP endpoint communicates with the Symantec Endpoint Protection Manager?


  1. Reduce number of content revisions to keep
  2. Increase download randomization window
  3. Reduce the heartbeat interval
  4. Increase Download Insight sensitivity level
Correct answer: B



Question 9

An administrator needs to add an Application Exception. When the administrator accesses the Application Exception dialog window, applications fail to appear. 
What is the likely problem?


  1. The Symantec Endpoint Protection Manager is installed on a Domain Controller 
  2. The client computers already have exclusions for the applications.
  3. The Learn applications that run on the client computers setting is disabled.
  4. The clients are in a trusted Symantec Endpoint Protection domain.
Correct answer: C



Question 10

An administrator is designing a new single site Symantec Endpoint Protection environment. Due to perimeter firewall bandwidth restrictions, the design needs to minimize the amount of traffic from content passing through the firewall. 
Which source must the administrator avoid using?


  1. Group Update Provider (GUP)
  2. LiveUpdate Administrator (LUA)
  3. Symantec Endpoint Protection Manager
  4. Shared Insight Cache (SIC)
Correct answer: B









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files