Symantec Premium 250-561 70q-DEMO
Symantec Premium 250-561 70q-DEMO
Symantec Premium 250-561 70q-DEMO
An administrator is evaluating an organization's computers for an upcoming SES deployment. Which computer meets the pre-requisites for the SES client?
A. A computer running Mac OS X 10.8 with 500 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processor
B. A computer running Mac OS X 10.14 with 400 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processor
C. A computer running Windows 10 with 400 MB of disk space, 2 GB of RAM, and a 2.4 GHz Intel Pentium 4 processor
D. A computer running Windows 8 with 380 MB of disk space, 2 GB of RAM, and a 2.8 GHz Intel Pentium 4 processor
Answer: C
Question No: 2
What are the Exploit Mitigation security control's mitigation techniques designed to prevent?
B. Misbehaving applications
C. File-less attacks
D. Rootkit downloads
Answer: D
Question No: 3
www.VCEup.com
Which security control is complementary to IPS, providing a second layer of protection against network attacks?
A. Host Integrity
B. Antimalware
C. Firewall
D. Network Protection
Answer: D
Question No: 4
Which alert rule category includes events that are generated about the cloud console?
A. Security
B. Diagnostic
C. System
D. Application Activity
Answer: A
Question No: 5
Which designation should an administrator assign to the computer configured to find unmanaged devices?
A. Discovery Broker
C. Discovery Manager
D. Discovery Device
Answer: B
Question No: 6
Which file should an administrator create, resulting Group Policy Object (GPO)?
A. Symantec__Agent_package_x64.zip
B. Symantec__Agent_package_x64.msi
C. Symantec__Agent_package__32-bit.msi
D. Symantec__Agent_package_x64.exe
Answer: C
Question No: 7
Which SEPM-generated element is required for an administrator to complete the enrollment of SEPM to the cloud console?
A. Token
B. SEPM password
Question No: 8
Which two (2) steps should an administrator take to guard against re-occurring threats? (Select two)
A. Confirm that daily active and weekly full scans take place on all endpoints
D. Add endpoints to a high security group and assign a restrictive Antimalware policy to the group
Answer: CE
Question No: 9
Which security threat uses malicious code to destroy evidence, break systems, or encrypt data?
A. Execution
B. Persistence
C. Impact
Answer: A
Question No: 10
Which default role has the most limited permission in the Integrated Cyber Defense Manager?
A. Restricted Administrator
B. Limited Administrator
C. Server Administrator
Answer: C
Question No: 11
What does an end-user receive when an administrator utilizes the Invite User feature to distribute the SES client?
B. An email with a link to a KB article explaining how to install the SES Agent
Answer: D
Answer: A
Question No: 13
Which two (2) skill areas are critical to the success of incident Response Teams (Select two)
A. Project Management
B. Incident Management
C. Cyber Intelligence
D. Incident Response
E. Threat Analysis
Answer: CD
Which two (2) Discovery and Deploy features could an administrator use to enroll MAC endpoints?
(Select two)
A. Push Enroll
D. Invite User
Answer: BE
Question No: 15
Which Firewall Stealth setting prevents OS fingerprinting by sending erroneous OS information back to the attacker?
Answer: C
A. Heartbeat
B. Standard polling
C. Push Notification
D. Long polling
Answer: C
Question No: 17
A. Delete
B. Hide
C. Encrypt
D. Blacklist
Answer: D
Question No: 18
A. Device Integrity
B. Threat Distribution
C. Comprehensive
D. Weekly
Answer: B
Question No: 19
What does SES's advanced search feature provide when an administrator searches for a specific term?
Answer: A
Question No: 20
In which phase of MITRE framework would attackers exploit faults in software to directly tamper with system memory?
A. Exfiltration
B. Discovery www.VCEup.com
C. Execution
D. Defense Evasion
Answer: D
Question No: 21
An administrator suspects that several computers have become part of a botnet. What should the administrator do to detect botnet activity on the network?
B. Add botnet related signatures to the IPS policy's Audit Signatures list
Answer: A
Question No: 22
Which Anti-malware technology should an administrator utilize to expose the malicious nature of a file created with a custom packet?
A. Sandbox
B. SONAR
D. Emulator
Answer: A
Question No: 23
An endpoint is offline, and the administrator issues a scan command. What happens to the endpoint when it restarts, if it lacks connectivity?
Answer: B
Question No: 24
A. Lateral Movement
B. Privilege Escalation
D. Credential Access
Answer: B www.VCEup.com
Question No: 25
What is the primary issue pertaining to managing roaming users while utilizing an on-premise solution?
Answer: C
Question No: 26
What should an administrator know regarding the differences between a Domain and a Tenant in ICDm?
Answer: A
Which SES advanced feature detects malware by consulting a training model composed of known good and known bad fries?
A. Signatures
C. Reputation
D. Artificial Intelligence
Answer: B
Question No: 28
Which Endpoint > Setting should an administrator utilize to locate unmanaged endpoints on a network subnet?
A. Discover Endpoints
B. Endpoint Enrollment
D. Device Discovery
Answer: A
Question No: 29
www.VCEup.com
Which Security Control dashboard widget should an administrator utilize to access detailed areas for a given security control ?
A. Learn More
B. Quick Links
C. More Info
D. Latest Tasks
Answer: D
Question No: 30
Answer: A
Question No: 31
A. One
Answer: C
Question No: 32
An administrator learns of a potentially malicious file and wants to proactively prevent the file from ever being executed.
Answer: D
Question No: 33
Which report template out format should an administrator utilize to generate graphical reports?
A. XML
B. HTML
C. PFD www.VCEup.com
D. XML
Answer: B
Question No: 34
Which Antimalware technology is used after all local resources have been exhausted?
A. Sapient
B. ITCS
C. Emulator
D. Reputation
Answer: B
Question No: 35
Which URL should an administrator test in a browser to determine if the issue is network related?
A. https://liveupdate.symantec,com/livetri.zi
B. http://update.symantec.com/livetri.zip
D. https://update.symantec.com/livetri.zip
Answer: C
Question No: 36
Which rule types should be at the bottom of the list when an administrator adds device control rules?
Answer: D
Question No: 37
Which two (2) scan range options are available to an administrator for locating unmanaged endpoints? (Select two)
C. Entire Network
D. Entire Subnet
Question No: 38
Which two (2) options is an administrator able to use to prevent a file from being fasely detected
(Select two)
Answer: BD
Question No: 39
Which framework, open and available to any administrator, is utilized to categorize adversarial tactics and for each phase of a cyber attack?
A. MITRE RESPONSE
B. MITRE ATT&CK
Answer: C
Question No: 40
Answer: A
Question No: 41
Which dashboard should an administrator access to view the current health of the environment?
Answer: D www.VCEup.com
Question No: 42
A user downloads and opens a PDF file with Adobe Acrobat. Unknown to the user, a hidden script in the file begins downloading a RAT.
Which Anti-malware engine recognizes that this behavior is inconsistent with normal Acrobat functionality, blocks the behavior and kills Acrobat?
A. SONAR
B. Sapient
C. IPS
D. Emulator
Answer: B
Question No: 43
Which IPS Signature type is Primarily used to identify specific unwanted traffic?
A. Attack
B. Probe
C. Audit
D. Malcode
Question No: 44
Which policy should an administrator edit to utilize the Symantec LiveUpdate server for pre-release content?
Answer: D
Question No: 45
Answer: B
Question No: 46
www.VCEup.com
An administrator selects the Discovered Items list in the ICDm to investigate a recent surge in suspicious file activity. What should an administrator do to display only high risk files?
Answer: B
Question No: 47
Which report template type should an administrator utilize to create a daily summary of network threats detected?
Answer: D
Question No: 48
A. SHA256
B. SHA256 "salted"
C. MD5 "Salted"
D. SHA2
Answer: A
Question No: 49
What are two (2) benefits of a fully cloud managed endpoint protection solution? (Select two)
B. Increased visibility
Answer: CD
Question No: 50
www.VCEup.com
Which term or expression is utilized when adversaries leverage existing tools in the environment?
A. opportunistic attack
B. script kiddies
D. file-less attack
Answer: B
Question No: 51
Which antimalware intensity level is defined by the following: "Blocks files that are most certainly bad or potentially bad files. Results in a comparable number of false positives and false negatives."
A. Level 5
B. Level 2
C. Level 1
D. Level 6
Answer: D
Question No: 52
An administrator needs to create a new Report Template that will be used to track firewall activity.
B. Generation schedule
C. Email recipients
D. Time frame
E. Size restrictions
Answer: AC
Question No: 53
Which SES feature helps administrator apply policies based on specific endpoint profiles?
A. Device Groups
B. Device Profiles
C. Policy Bundles
D. Policy Groups
Answer: D
Question No: 54
Wh.ch Firewall rule components should an administrator configure to block facebook.com use during business hours?
Answer: A
Question No: 55
The ICDm has generated a blacklist task due to malicious traffic detection. Which SES component was utilized to make that detection?
A. Antimalware
B. Reputation
C. Firewall
D. IPS
Answer: A
Question No: 56
Which file property does SES utilize to search the VirusTotal website for suspicious file information?
A. File reputation
B. File size
D. File hash
Answer: C
Question No: 57
How long does a blacklist task remain in the My Tasks view after its automatic creation?
A. 180 Days
B. 30 Days
C. 60 Days
D. 90 Days
Answer: B
Question No: 58
Why would an administrator choose the Server-optimized installation option when creating an installation package?
C. To add the SES client's Optimize Memory setting to the default server installation.
www.VCEup.com
D. To reduce the SES client's using resources that are required for other server-specific processes.
Answer: A
Question No: 59
In the ICDm, administrators are assisted by the My Task view. Which automation type creates the tasks within the console?
A. Artificial Intelligence
B. Machine Learning
Answer: A
Question No: 60
Which area of the management console is able to have access restricted or granted?
A. Policy Management
C. Agent deployment
Question No: 61
Which SES security control protects against threats that may occur in the Impact phase?
A. Device Control
B. IPS
C. Antimalware
D. Firewall
Answer: D
Question No: 62
What option must an administrator choose when rolling back a policy assignment to a previous version?
A. Customize
B. Reverse
C. Override
D. Go Back
Answer: C
Question No: 63
www.VCEup.com
After editing and saving a policy, an administrator is prompted with the option to apply the edited policy to any assigned device groups.
What happens to the new version of the policy if the administrator declines the option to apply it?
D. The new version of the policy is added to the "in progress" list
Answer: A
Question No: 64
Which technique randomizes the e memory address map with Memory Exploit Mitigation?
A. SEHOP
B. ROPHEAP
C. ASLR
D. ForceDEP
Answer: C
Question No: 65
Answer: B
Question No: 66
Answer: D
Question No: 67
Which device page should an administrator view to track the progress of an issued device command?
A. Command Status
D. Activity Update
Answer: C
Question No: 68
What must an administrator check prior to enrolling an on-prem SEPM infrastructure into the cloud?
Answer: D
Question No: 69
What is the frequency of feature updates with SES and the Integrated Cyber Defense Manager (ICDm)
A. Monthly
B. Weekly
D. Bi-monthly
Answer: B
Question No: 70
Which URL is responsible for notifying the SES agent that a policy change occurred in the cloud console?
A. spoc.norton.com
B. stnd-ipsg.crsi-symantec.com
C. ent-shasta.rrs-symantec.com
D. ocsp.digicert.com
Answer: D
www.VCEup.com