1.
Which Symantec Endpoint Protection 12.1 component improves performance because known good files are skipped?
2.
How can an administrator manage multiple, independent companies from one database while maintaining independent groups, computers, and policies?
3.
A company with one site has a factory with computers in the manufacturing area. Both factory managers and operators need to log in to these shared computers. Different policies will be applied depending on whether the individual logging in to the machine is a manager or an operator. Which Symantec Endpoint Protection 12.1 feature provides this ability?
4.
Where is a file encrypted and saved to when the "Backup files before attempting to repair them" setting is enabled?
5.
Drive-by downloads are a common vector of infections. Some of these attacks use encryption to bypass traditional defense mechanisms. Which Symantec Endpoint Protection 12.1 protection technology blocks such obfuscated attacks?
6.
An administrator needs to customize the Application and Device Control policy to exclude all USB devices except for a specific, company-issued USB thumb drive. Which function or program, provided with the Symantec Endpoint Protection 12.1 software, should the administrator use to customize the environment?
7.
A company suffered a catastrophic hardware failure on the Symantec Endpoint Protection Manager (SEPM) which was using a remote Microsoft SQL Server. The administrator has all required backups. The administrator restores the hardware and the operating system with the required software (including SEPM). What is the next step in the recovery procedure?
8.
An administrator enabled virtual image exceptions for Auto-Protect and Administrator-Defined scans on virtual machines. In order to protect against previously undetected threats, the administrator must regularly scan the static instance of the virtual machine image set which includes the files that have been whitelisted. In addition to cleaning the static image set, which additional step must the administrator complete if threats are discovered?
9.
Which statement describes a difference between Virtual Image Exceptions (VIE) and Shared Insight Cache (SIC)?
10.
Which feature can be configured to increase or decrease performance of scheduled scans?