Which task should an administrator perform to troubleshoot operation of the Symantec Endpoint Protection embedded database?
A. verify that dbsrv11.exe is listening on port 2638
B. check whether the MSSQLSERVER service is running
C. verify the sqlserver.exe service is running on port 1433
D. check the database transaction logs in X:\Program Files\Microsoft SQL server
A company uses a remote administration tool that is detected and quarantined by Symantec Endpoint Protection (SEP).
Which step can an administrator perform to continue using the remote administration tool without detection by SEP?
A. create a Tamper Protect exception for the tool
B. create an Application to Monitor exception for the tool
C. create a Known Risk exception for the tool
D. create a SONAR exception for the tool
A company receives a high number of reports from users that files being downloaded from internal web servers are blocked. The Symantec Endpoint Protection administrator verifies that the Automatically trust any file downloaded from an intranet website option is enabled.
Which configuration can cause Insight to block the files being downloaded from the internal web servers?
A. Intrusion Prevention is disabled.
B. Local intranet zone is configured incorrectly on the Windows clients browser settings.
C. Local intranet zone is configured incorrectly on the Mac clients browser settings.
D. Virus and Spyware Definitions are out of date.
Which action should an administrator take to prevent users from using Windows Security Center?
A. set Disable antivirus alert within Windows Security Center to Disable
B. set Disable antivirus alert within Windows Security Center to Never
C. set Disable Windows Security Center to Disable
D. set Disable Windows Security Center to Always
An administrator needs to increase the access speed for client files that are stored on a file server. Which configuration should the administrator review to address the read speed from the server?
A. Enable Network Cache in the client's Virus and Spyware Protection policy
B. Add the applicable server to a trusted host group
C. Create a Firewall allow rule for the server's IP address
D. Enable download randomization in the client group's communication settings
A user is unknowingly about to connect to a malicious website and download a known threat within a .rar file. All Symantec Endpoint Protection technologies are installed on the client's system.
In which feature set order must the threat pass through to successfully infect the system?
A. Download Insight, Firewall, IPS
B. Firewall, IPS, Download Insight
C. IPS, Firewall, Download Insight
D. Download Insight, IPS, Firewall
Multiple Windows virtual clients running on an ESX server need to be scanned daily by a scheduled scan. Which feature should an administrator use to improve scan performance on the clients?
A. Virtual Image exceptions
B. Centralized Scan exceptions
C. Download Insight
D. Tamper Protection
An exception needs to be created for a file named "RunMe.exe" in a user's Windows 7 "My Documents" folder. The user's login name is Bob.
Which method should be used?
A. create a file exception for "RunMe.exe" with a Prefix Variable of [USERNAME]
B. create a file exception for "[Drive]:\Users\Bob\My Documents\RunMe.exe"
C. create a file exception for "*\RunMe.exe"
D. create a file exception for "RunMe.exe" with a Prefix Variable of %USERPROFILE%
You have executed the vxdg -g diskgroup adddisk disk_name= command. Which switch needs to be added to force VxVM to take the disk media name of the failed disk and assign it to the new replacement disk?
A. -force
B. -k
C. -f
D. -assign
An administrator is recovering from a Symantec Endpoint Manager (SEPM) site failure.
Which file should the administrator use during an install of SEPM to recover the lost environment according to Symantec Disaster Recovery Best Practice documentation?
A. original installation log
B. recovery_timestamp file
C. settings.properties file
D. Sylink.xml file from the SEPM