1 / 11

Symantec SCS 250-550 Practice Test Questions

PassQuestion provides the best Symantec SCS 250-550 Practice Test Questions which would allow you to obtain exam efficiently.<br>

Download Presentation

Symantec SCS 250-550 Practice Test Questions

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 250-550 Free Questions 250-550 Free Questions Administration of Symantec Endpoint Security Administration of Symantec Endpoint Security – R1 – R1 https://www.passquestion.com/ https://www.passquestion.com/250-550 250-550.html .html

  2. Question 1 Question 1 What does an end-user receive when an administrator utilizes the Invite User feature to What does an end-user receive when an administrator utilizes the Invite User feature to distribute the SES client? distribute the SES client? A. An email with a link to directly download the SES client A. An email with a link to directly download the SES client B. An email with a link to a KB article explaining how to install the SES Agent B. An email with a link to a KB article explaining how to install the SES Agent C. An email with the SES_setup.zip file attached C. An email with the SES_setup.zip file attached D. An email with link to register on the ICDm user portal D. An email with link to register on the ICDm user portal Answer: D Answer: D

  3. Question 2 Question 2 What version number is assigned to a duplicated policy? What version number is assigned to a duplicated policy? A. One A. One B. Zero B. Zero C. The original policy's number plus one C. The original policy's number plus one D. The original policy's version numb D. The original policy's version numb Answer: C Answer: C

  4. Question 3 Question 3 Which dashboard should an administrator access to view the current health of the environment? Which dashboard should an administrator access to view the current health of the environment? A. The Antimalware Dashboard A. The Antimalware Dashboard B. The SES Dashboard B. The SES Dashboard C. The Device Integrity Dashboard C. The Device Integrity Dashboard D. The Security Control Dashboard D. The Security Control Dashboard Answer: D Answer: D

  5. Question 4 Question 4 An administrator is evaluating an organization's computers for an upcoming SES deployment. An administrator is evaluating an organization's computers for an upcoming SES deployment. Which computer meets the pre-requisites for the SES client? Which computer meets the pre-requisites for the SES client? A. A computer running Mac OS X 10.8 with 500 MB of disk space, 4 GB of RAM, and an Intel Core A. A computer running Mac OS X 10.8 with 500 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processor 2 Duo 64-bit processor B. A computer running Mac OS X 10.14 with 400 MB of disk space, 4 GB of RAM, and an Intel B. A computer running Mac OS X 10.14 with 400 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processor Core 2 Duo 64-bit processor C. A computer running Windows 10 with 400 MB of disk space, 2 GB of RAM, and a 2.4 GHz Intel C. A computer running Windows 10 with 400 MB of disk space, 2 GB of RAM, and a 2.4 GHz Intel Pentium 4 processor Pentium 4 processor D. A computer running Windows 8 with 380 MB of disk space, 2 GB of RAM, and a 2.8 GHz Intel D. A computer running Windows 8 with 380 MB of disk space, 2 GB of RAM, and a 2.8 GHz Intel Pentium 4 processor Pentium 4 processor Answer: C Answer: C

  6. Question 5 Question 5 In the ICDm, administrators are assisted by the My Task view. In the ICDm, administrators are assisted by the My Task view. Which automation type creates the tasks within the console? Which automation type creates the tasks within the console? A. Artificial Intelligence A. Artificial Intelligence B. Machine Learning B. Machine Learning C. Advanced Machine Learning C. Advanced Machine Learning D. Administrator defined rules D. Administrator defined rules Answer: A Answer: A

  7. Question 6 Question 6 Which two (2) options is an administrator able to use to prevent a file from being fasely detected Which two (2) options is an administrator able to use to prevent a file from being fasely detected (Select two) (Select two) A. Assign the file a SHA-256 cryptographic hash A. Assign the file a SHA-256 cryptographic hash B. Add the file to a Whitelist policy B. Add the file to a Whitelist policy C. Reduce the Intensive Protection setting of the Antimalware policy C. Reduce the Intensive Protection setting of the Antimalware policy D. Register the file with Symantec's False Positive database D. Register the file with Symantec's False Positive database E. Rename the file E. Rename the file Answer: B,D Answer: B,D

  8. Question 7 Question 7 Which statement best describes Artificial Intelligence? Which statement best describes Artificial Intelligence? A. A program that automates tasks with a static set of instructions A. A program that automates tasks with a static set of instructions B. A program that can predict when a task should be performed B. A program that can predict when a task should be performed C. A program that is autonomous and needs training to perform a task C. A program that is autonomous and needs training to perform a task D. A program that learns from experience and perform autonomous tasks D. A program that learns from experience and perform autonomous tasks Answer: A Answer: A

  9. Question 8 Question 8 Which SES advanced feature detects malware by consulting a training model composed of known Which SES advanced feature detects malware by consulting a training model composed of known good and known bad fries? good and known bad fries? A. Signatures A. Signatures B. Advanced Machine Learning B. Advanced Machine Learning C. Reputation C. Reputation D. Artificial Intelligence D. Artificial Intelligence Answer: B Answer: B

  10. Question 9 Question 9 Which two (2) Discovery and Deploy features could an administrator use to enroll MAC endpoints? Which two (2) Discovery and Deploy features could an administrator use to enroll MAC endpoints? (Select two) (Select two) A. Push Enroll A. Push Enroll B. A custom Installation package creator pact B. A custom Installation package creator pact C. A default Direct Installation package C. A default Direct Installation package D. Invite User D. Invite User E. A custom Direct installation package E. A custom Direct installation package Answer: B,E Answer: B,E

  11. Question 10 Question 10 Which SEPM-generated element is required for an administrator to complete the enrollment of Which SEPM-generated element is required for an administrator to complete the enrollment of SEPM to the cloud console? SEPM to the cloud console? A. Token A. Token B. SEPM password B. SEPM password C. Certificate key pair C. Certificate key pair D. SQL password D. SQL password Answer: A Answer: A

More Related