Wh.ch Firewall rule components should an administrator configure to block facebook.com use during business hours?
A. Action, Hosts(s), and Schedule
B. Action, Application, and Schedule
C. Host(s), Network Interface, and Network Service
D. Application, Host(s), and Network Service
Which rule types should be at the bottom of the list when an administrator adds device control rules?
A. General "catch all" rules
B. General "brand defined" rules
C. Specific "device type" rules
D. Specific "device model" rules
What is the frequency of feature updates with SES and the Integrated Cyber Defense Manager (ICDm)
A. Monthly
B. Weekly
C. Quarterly
D. Bi-monthly
What does SES's advanced search feature provide when an administrator searches for a specific term?
A. A search modifier dialog
B. A search wizard dialog
C. A suggested terms dialog
D. A search summary dialog
What must an administrator check prior to enrolling an on-prem SEPM infrastructure into the cloud?
A. Clients are running SEP 14.2 or later
B. Clients are running SEP 14.1.0 or later
C. Clients are running SEP 12-6 or later
D. Clients are running SEP 14.0.1 or late
Which option should an administrator utilize to temporarily or permanently block a file?
A. Delete
B. Hide
C. Encrypt
D. Blacklist
Which Security Control dashboard widget should an administrator utilize to access detailed areas for a given security control ?
A. Learn More
B. Quick Links
C. More Info
D. Latest Tasks
Which SES advanced feature detects malware by consulting a training model composed of known good and known bad fries?
A. Signatures
B. Advanced Machine Learning
C. Reputation D. Artificial Intelligence
Which security control is complementary to IPS, providing a second layer of protection against network attacks?
A. Host Integrity
B. Antimalware
C. Firewall
D. Network Protection
Which designation should an administrator assign to the computer configured to find unmanaged devices?
A. Discovery Broker
B. Discovery Agent
C. Discovery Manager
D. Discovery Device
Which report template out format should an administrator utilize to generate graphical reports?
A. XML
B. HTML
C. PFD
D. XML
What option must an administrator choose when rolling back a policy assignment to a previous version?
A. Customize
B. Reverse
C. Override
D. Go Back
Which statement best defines Machine Learning?
A. A program that needs user input to perform a task.
B. A program that teams from observing other programs.
C. A program that learns from experience to optimize the output of a task.
D. A program that require data to perform a task.
Which IPS Signature type is Primarily used to identify specific unwanted traffic?
A. Attack
B. Probe
C. Audit
D. Malcode
An endpoint fails to retrieve content updates.
Which URL should an administrator test in a browser to determine if the issue is network related?
A. https://liveupdate.symantec,com/livetri.zi
B. http://update.symantec.com/livetri.zip
C. https://spocsymantec.com/livetri.zip
D. https://update.symantec.com/livetri.zip