An administrator is troubleshooting a Symantec Endpoint Protection (SEP) replication.
Which component log should the administrator check to determine whether the communication between the two sites is working correctly?
Which action must a Symantec Endpoint Protection administrator take before creating custom Intrusion Prevention signatures?
Which security threat stage seeks to gather valuable data and upload it to a compromised system?
What account type must the AD Gateway Service Account be assigned to the AD Gateway device for AD Synchronization to function correctly?
Which rule types should be at the bottom of the list when an administrator adds device control rules?
On which platform is LiveShell available?
When are events generated within SEDR?
What prevention technique does Threat Defense for Active Directory use to expose attackers?
Which option should an administrator utilize to temporarily or permanently block a file?
How would an administrator specify which remote consoles and servers have access to the management server?
What type of policy provides a second layer of defense, after the Symantec firewall?
Which action can an administrator take to improve the Symantec Endpoint Protection Manager (SEPM) dashboard performance and report accuracy?
If an administrator enables the setting to manage policies from the cloud, what steps must be taken to reverse this process?
What must be entered before downloading a file from ICDm?
When can an administrator add a new replication partner?
Which other items may be deleted when deleting a malicious file from an endpoint?
What is a feature of Cynic?
Which technology can prevent an unknown executable from being downloaded through a browser session?
Which technique randomizes the memory address map with Memory Exploit Mitigation?
What does the Endpoint Communication Channel (ECC) 2.0 allow Symantec EDR to directly connect to?
How are Insight results stored?
What type of Threat Defense for Active Directory alarms are displayed after domain misconfigurations or hidden backdoors are detected?
A file has been identified as malicious.
Which feature of SEDR allows an administrator to manually block a specific file hash?
What EDR feature provides endpoint activity recorder data for a file hash?
Which communication method is utilized within SES to achieve real-time management?
What information is required to calculate retention rate?
In what order should an administrator configure the integration between SEDR and Symantec Endpoint Protection in order to maximize their benefits?
When a SEPM is enrolled in ICDm, which policy can only be managed from the cloud?
What feature is used to get a comprehensive picture of infected endpoint activity?
How would an administrator specify which remote consoles and servers have access to the management server?
What does an end-user receive when an administrator utilizes the Invite User feature to distribute the SES client?
An organization would like to use a content distribution method that centrally controls content types and versions. Almost all of their endpoints are running Windows.
What type of content distribution method should be used?
What is the result of disjointed telemetry collection methods used within an organization?
Which Symantec Endpoint Protection technology blocks a downloaded program from installing browser plugins?
Which report template type should an administrator utilize to create a daily summary of network threats detected?
Which security control performs a cloud lookup on files downloaded during the Initial Access phase?
Which designation should an administrator assign to the computer configured to find unmanaged devices?
What priority would an incident that may have an impact on business be considered?
The SES Intrusion Prevention System has blocked an intruder's attempt to establish an IRC connection inside the firewall. Which Advanced Firewall Protection setting should an administrator enable to prevent the intruder's system from communicating with the network after the IPS detection?
What is the timeout for the file deletion command in SEDR?
What information is required to calculate storage requirements?
What does a medium-priority incident indicate?
An administrator decides to migrate an SES Complete hybrid environment to a fully cloud-managed one. After cleaning up on-premise group structure and policies. What is the next recommended step for migration?
When a SEPM is enrolled in ICDm, which policy can only be managed from the cloud?
What information is required to calculate storage requirements?