Which technology can prevent an unknown executable from being downloaded through a browser session?
Correct Answer: B
Symantec Insighttechnology can prevent the download of unknown executables through a browser session by leveraging a cloud-based reputation service. Insight assesses the reputation of files based on data collected from millions of endpoints, blocking downloads that are unknown or have a lowreputation. This technology is particularly effective against zero-day threats or unknown files that do not yet have established signatures.
250-580 Exam Question 47
What is the difference between running Device Control for a Mac versus Windows?
Correct Answer: B
Device Control operates differently on Mac compared to Windows in Symantec Endpoint Protection: * Mac Device Control Functionality: * On macOS, Device Control operates at thevolume level, specifically targeting storage devices. * This volume-level control means that SEP enforces policies on storage devices like external drives, USB storage, or other mounted storage volumes rather than peripheral devices in general. * Platform Differences: * On Windows, Device Control can operate at a more granular level (driver level), allowing enforcement across a broader range of devices, including non-storage peripherals. * Why Other Options Are Incorrect: * Option A (driver level) is incorrect for Mac, as SEP does not control non-storage device drivers on macOS. * Option C (kernel level) and D (user level) incorrectly describe the control layer and do not accurately reflect SEP's enforcement scope on Mac. References: The device control implementation on macOS, specifically focusing on volume-based storage device control, is part of SEP's cross-platform device management features.
250-580 Exam Question 48
Which device page should an administrator view to track the progress of an issued device command?
Correct Answer: C
TheCommand Statuspage is where an administrator should track theprogress of issued device commandsin Symantec Endpoint Security. This page provides: * Real-Time Command Updates:It shows the current status of commands, such as "Pending," "Completed," or "Failed," providing immediate insights into the command's execution. * Detailed Progress Tracking:Command Status logs offer details on each command, enabling the administrator to confirm that actions, such as scans, updates, or reboots, have been successfully processed by the endpoint. The Command Status page is essential for effective device management, as it helps administrators monitor and verify the outcome of their issued commands.
250-580 Exam Question 49
Where in the Attack Chain does Threat Defense for Active Directory provide protection?
Correct Answer: A
Threat Defense for Active Directory(TDAD) provides protection primarily at theAttack Surface Reduction stage in the Attack Chain. TDAD focuses on minimizing the exposure of Active Directory by deploying deceptive measures, such as honeypots and decoy objects, which limit the opportunities forattackers to exploit AD vulnerabilities or gather useful information. By reducing the visible attack surface, TDAD makes it more difficult for attackers to successfully initiate or escalate attacks within the AD environment. * Function of Attack Surface Reduction: * Attack Surface Reduction involves implementing controls and deceptive elements that obscure or complicate access paths for potential attackers. * TDAD's deception techniques and controls help divert and confuse attackers, preventing them from finding or exploiting AD-related assets. * Why Other Options Are Incorrect: * Attack Prevention(Option B) andDetection and Response(Option C) occur later in the chain, focusing on mitigating and reacting to detected threats. * Breach Prevention(Option D) encompasses a broader strategy and does not specifically address TDAD's role in reducing AD exposure. References: TDAD's role in reducing the attack surface for Active Directory supports preemptive measures against potential threats in the early stages of the attack chain.
250-580 Exam Question 50
Which two (2) considerations must an administrator make when enabling Application Learning in an environment? (Select two.)
Correct Answer: A,B
When enablingApplication Learningin Symantec Endpoint Protection (SEP), an administrator should consider the following: * Increased False Positives:Application Learning may lead to increased false positives, as it identifies unfamiliar or rare applications that might not necessarily pose a threat. * Pilot Deployment Recommended:To mitigate potential disruptions, Application Learning should initially be deployed on a small subset of systems. This approach allows administrators to observe its impact, refine policies, and control the learning data gathered before extending it across the entire enterprise. These considerations help manage the resource impact and ensure the accuracy of Application Learning.