What is the first step taken when defining the core security/protection requirements in the Assess phase?
Correct Answer: A
The first step in definingcore security and protection requirementsduring theAssess phaseis tostart with high-level questions and pain points. This approach helps clarify the customer's key concerns, primary risks, and specific protection needs, providing a foundation to tailor the security solution effectively. By focusing on these high-level issues, the assessment can be aligned with the customer's unique environment and strategic objectives. SES Complete Implementation Curriculumoutlines this initial step as critical for gathering relevant information that shapes the direction of the security solution, ensuring it addresses the customer's main pain points and requirements comprehensively.
250-586 Exam Question 12
Which feature is designed to reduce the attack surface by managing suspicious behaviors performed by trusted applications?
Correct Answer: C
Adaptive Protectionis designed to reduce the attack surface bymanaging suspicious behaviors performed by trusted applications. This feature provides dynamic, behavior-based protection that allows trusted applications to operate normally while monitoring and controlling any suspicious actions they might perform. * Purpose of Adaptive Protection: It monitors and restricts potentially harmful behaviors in applications that are generally trusted, thus reducing the risk of misuse or exploitation. * Attack Surface Reduction: By focusing on behavior rather than solely on known malicious files, Adaptive Protection effectively minimizes the risk of attacks that exploit legitimate applications. Explanation of Why Other Options Are Less Likely: * Option A (Malware Prevention Configuration)targets malware but does not specifically control trusted applications' behaviors. * Option B (Host Integrity Configuration)focuses on policy compliance rather than behavioral monitoring. * Option D (Network Integrity Configuration)deals with network-level threats, not application behaviors. Therefore,Adaptive Protectionis the feature best suited toreduce the attack surface by managing suspicious behaviorsin trusted applications.
250-586 Exam Question 13
What should be documented in the Infrastructure Design section to enable traffic redirection to Symantec servers?
Correct Answer: A
In theInfrastructure Designsection, documenting therequired ports and protocolsis essential for enabling traffic redirection to Symantec servers. This setup is necessary for allowing endpoints to communicate with Symantec's servers for updates, threat intelligence, and other cloud-based security services. * Traffic Redirection to Symantec Servers: For endpoints to interact with Symantec servers, specific network configurations must be in place. Listing the requiredports(e.g., port 443 for HTTPS) and protocolsensures that traffic can flow seamlessly from the endpoint to the server. * Ensuring Compatibility and Connectivity: Documenting ports and protocols helps administrators verify that network configurations meet the security and operational requirements, facilitating proper communication and content updates. * Infrastructure Design Clarity: This documentation clarifies network requirements, allowing for easier troubleshooting and setup consistency across various sites within an organization. Explanation of Why Other Options Are Less Likely: * Option B (Hardware recommendations),Option C (Site Topology description), andOption D (Disaster recovery plan)are important elements but do not directly impact traffic redirection to Symantec servers. Thus, documentingrequired ports and protocolsis critical in theInfrastructure Designfor enabling effective traffic redirection.
250-586 Exam Question 14
Which type of infrastructure does the analysis of SES Complete Infrastructure mostly apply to?
Correct Answer: B
Theanalysis of SES Complete Infrastructureprimarily applies toon-premise or hybrid infrastructures. This is because SES Complete often integrates both on-premise SEP Managers and cloud components, particularly in hybrid setups. * On-Premise and Hybrid Complexity: These types of infrastructures involve both on-premise SEP Managers and cloud components, which require careful analysis to ensure proper configuration, security policies, and seamless integration. * Integration with Cloud Services: Hybrid infrastructures particularly benefit from SES Complete's capability to bridge on-premise and cloud environments, necessitating detailed analysis to optimize communication, security, and functionality. * Applicability to SES Complete's Architecture: The SES Complete solution is designed with flexibility to support both on-premise and cloud environments, with hybrid setups being common for organizations transitioning to cloud-based services. Explanation of Why Other Options Are Less Likely: * Option A (Cloud-based)does not fully apply as SES Complete includes significant on-premise components in hybrid setups. * Option C (Virtual infrastructure)andOption D (Mobile infrastructure)may involve endpoint protection but do not specifically align with the full SES Complete infrastructure requirements. Thus, the correct answer ison-premise or hybrid infrastructure.
250-586 Exam Question 15
What protection technologies should an administrator enable to protect against Ransomware attacks?
Correct Answer: B
To protect againstRansomware attacks, an administrator should enableIntrusion Prevention System (IPS), SONAR(Symantec Online Network for Advanced Response), andDownload Insight. These technologies collectively provide layered security against ransomware by blocking known exploits (IPS), detecting suspicious behaviors (SONAR), and analyzing downloaded files for potential threats (Download Insight), significantly reducing the risk of ransomware infections. Symantec Endpoint Protection Documentationemphasizes the combination of IPS, SONAR, and Download Insight as essential components for ransomware protection due to their proactive and reactive threat detection capabilities.