A computer is configured in Mixed Control mode. The administrator creates and applies a Firewall policy to the
computer that has a rule that allows FTP traffic above the blue line and another rule that blocks LDAP traffic
below the blue line. On the computer, local rules are created to allow LDAP traffic and block FTP traffic. Which
traffic flow behavior should be expected on the local computer?
A company is running the Symantec Endpoint Protection 12.1 firewall and wants to ensure that DNS traffic is
allowed. Which feature should be enabled in the firewall policy?
A company is experiencing a malware outbreak. The company deploys Symantec Endpoint Protection 12.1,
with only Virus and Spyware Protection, Application and Device Control, and Intrusion Prevention technologies.
Why would Intrusion Prevention be unable to block all communications from an attacking host?
A system administrator created a firewall policy that allows certain applications and blocks others. However,
some applications are being blocked that should be allowed. Which log should be viewed to troubleshoot this
issue?
An administrator has defined a rule to allow traffic to and from a specific server by its Fully Qualified Domain
Name (FQDN), because the server's IP address varies based on the office in which a client is located. The
administrator attempts to verify the rule and finds that the traffic is being blocked. The logs list the IP address of
the server instead of its FQDN. What does the administrator need to do within the firewall policy to allow the
rule to work correctly?
A company is running the Symantec Endpoint Protection 12.1 firewall with the default policy. At the bottom of
the ruleset, there is a rule called "Block all other IP traffic and log" which will block all IP traffic. A financial
application is being blocked by this rule. What should be changed to allow the application without sacrificing
security?
A company has a firewall policy with a rule that allows all applications on all ports. An administrator needs to
modify the policy so that it allows Internet Explorer to communicate to any website, but only on port 80 and 443.
In addition, the company only wants this modification to affect traffic from Internet Explorer. The administrator
created a new rule at the top of the ruleset that allows Internet Explorer on port 80 and 443. Which step should
the administrator take next?
The Symantec Endpoint Protection 12.1 (SEP) client indicates that the Virus and Spyware Protection (AV)
definitions are current, while the Intrusion Prevention System (IPS) signatures are one day older. How can an
administrator determine whether this SEP client is up-to-date?
A company selected Opera 10 as its corporate browser. Drive-by downloads are occurring and SONAR
intercepts the resulting scripts. How should the company proceed to minimize the occurrence of drive-by
downloads?