Pass4itsure > Symantec > SCS > 250-315 > 250-315 Online Practice Questions and Answers

250-315 Online Practice Questions and Answers

Questions 4

Which task should an administrator perform to troubleshoot operation of the Symantec Endpoint Protection embedded database?

A. verify that dbsrv11.exe is listening on port 2638

B. check whether the MSSQLSERVER service is running

C. verify the sqlserver.exe service is running on port 1433

D. check the database transaction logs in X:\Program Files\Microsoft SQL server

Buy Now
Questions 5

A company uses a remote administration tool that is detected and quarantined by Symantec Endpoint Protection (SEP).

Which step can an administrator perform to continue using the remote administration tool without detection by SEP?

A. create a Tamper Protect exception for the tool

B. create an Application to Monitor exception for the tool

C. create a Known Risk exception for the tool

D. create a SONAR exception for the tool

Buy Now
Questions 6

A company receives a high number of reports from users that files being downloaded from internal web servers are blocked. The Symantec Endpoint Protection administrator verifies that the Automatically trust any file downloaded from an intranet website option is enabled.

Which configuration can cause Insight to block the files being downloaded from the internal web servers?

A. Intrusion Prevention is disabled.

B. Local intranet zone is configured incorrectly on the Windows clients browser settings.

C. Local intranet zone is configured incorrectly on the Mac clients browser settings.

D. Virus and Spyware Definitions are out of date.

Buy Now
Questions 7

Which action should an administrator take to prevent users from using Windows Security Center?

A. set Disable antivirus alert within Windows Security Center to Disable

B. set Disable antivirus alert within Windows Security Center to Never

C. set Disable Windows Security Center to Disable

D. set Disable Windows Security Center to Always

Buy Now
Questions 8

An administrator needs to increase the access speed for client files that are stored on a file server. Which configuration should the administrator review to address the read speed from the server?

A. Enable Network Cache in the client's Virus and Spyware Protection policy

B. Add the applicable server to a trusted host group

C. Create a Firewall allow rule for the server's IP address

D. Enable download randomization in the client group's communication settings

Buy Now
Questions 9

A user is unknowingly about to connect to a malicious website and download a known threat within a .rar file. All Symantec Endpoint Protection technologies are installed on the client's system.

In which feature set order must the threat pass through to successfully infect the system?

A. Download Insight, Firewall, IPS

B. Firewall, IPS, Download Insight

C. IPS, Firewall, Download Insight

D. Download Insight, IPS, Firewall

Buy Now
Questions 10

Multiple Windows virtual clients running on an ESX server need to be scanned daily by a scheduled scan. Which feature should an administrator use to improve scan performance on the clients?

A. Virtual Image exceptions

B. Centralized Scan exceptions

C. Download Insight

D. Tamper Protection

Buy Now
Questions 11

An exception needs to be created for a file named "RunMe.exe" in a user's Windows 7 "My Documents" folder. The user's login name is Bob.

Which method should be used?

A. create a file exception for "RunMe.exe" with a Prefix Variable of [USERNAME]

B. create a file exception for "[Drive]:\Users\Bob\My Documents\RunMe.exe"

C. create a file exception for "*\RunMe.exe"

D. create a file exception for "RunMe.exe" with a Prefix Variable of %USERPROFILE%

Buy Now
Questions 12

You have executed the vxdg -g diskgroup adddisk disk_name= command. Which switch needs to be added to force VxVM to take the disk media name of the failed disk and assign it to the new replacement disk?

A. -force

B. -k

C. -f

D. -assign

Buy Now
Questions 13

An administrator is recovering from a Symantec Endpoint Manager (SEPM) site failure.

Which file should the administrator use during an install of SEPM to recover the lost environment according to Symantec Disaster Recovery Best Practice documentation?

A. original installation log

B. recovery_timestamp file

C. settings.properties file

D. Sylink.xml file from the SEPM

Buy Now
Exam Code: 250-315
Exam Name: Administration of Symantec Endpoint Protection 12.1
Last Update: Apr 20, 2024
Questions: 275
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99