1.
When can an administrator delete a location?
2.
A large oil company has a small exploration department that is remotely located and rarely has internet connectivity. Which client type would allow the exploration department to configure their own security policies?
3.
A large software company has a small engineering department that is remotely located over a slow WAN connection. Which method will deploy the Symantec Endpoint Protection 12.1 (SEP) clients to the remote site using the smallest amount of network bandwidth?
4.
An administrator created a Symantec Endpoint Protection 12.1 (SEP) installation package without specifying the group to which the SEP clients should belong. What will happen when the administrator tries to install a SEP client using the installation package?
5.
A Symantec Endpoint Protection 12.1 (SEP) administrator discovers that a firewall is blocking Windows file sharing. Which method can bypass the firewall and allow the SEP clients to be installed with a minimum amount of effort?
6.
In which two situations would Symantec Endpoint Protection 12.1 (SEP) generate a Left Alone action? (Select two.)
7.
An administrator is reviewing risk logs in the Symantec Endpoint Protection Manager (SEPM) and notices that some entries list that the "Risk was partially removed". The administrator wants to determine whether additional steps are necessary to remediate the threat. How should the administrator proceed?
8.
A clean file in a proprietary application has been quarantined by SONAR. How can an administrator fix the broken application from the Symantec Endpoint Protection Manager console?
9.
Which Symantec Endpoint Protection 12.1 defense mechanism provides protection against worms like W32.Silly.FDC, which propagate from system to system through the use of autorun.inf files?
10.
Which Symantec Endpoint Protection 12.1 feature allows an administrator to prevent users from downloading files that are unsafe?