A company with one site has a factory with computers in the manufacturing area. Both factory managers and
operators need to log in to these shared computers. Different policies will be applied depending on whether the
individual logging in to the machine is a manager or an operator. Which Symantec Endpoint Protection 12.1
feature provides this ability?
Drive-by downloads are a common vector of infections. Some of these attacks use encryption to bypass
traditional defense mechanisms. Which Symantec Endpoint Protection 12.1 protection technology blocks such
obfuscated attacks?
An administrator needs to customize the Application and Device Control policy to exclude all USB devices
except for a specific, company-issued USB thumb drive. Which function or program, provided with the
Symantec Endpoint Protection 12.1 software, should the administrator use to customize the environment?
A company suffered a catastrophic hardware failure on the Symantec Endpoint Protection Manager (SEPM)
which was using a remote Microsoft SQL Server. The administrator has all required backups. The administrator
restores the hardware and the operating system with the required software (including SEPM). What is the next
step in the recovery procedure?
An administrator enabled virtual image exceptions for Auto-Protect and Administrator-Defined scans on virtual
machines. In order to protect against
previously undetected threats, the administrator must regularly scan the static instance of the virtual machine
image set which includes the files that
have been whitelisted. In addition to cleaning the static image set, which additional step must the administrator
complete if threats are discovered?