Question No : 1
Which two actions can be performed from the SEPM Reports page? (Choose two)
정답:
Question No : 2
What is a common use case for implementing System Lockdown in a production environment?
정답:
Question No : 3
How does SEP apply Memory Exploit Mitigation to applications on a client system?
정답:
Question No : 4
What action can you perform directly from the SEPM Clients view to respond to a detected threat on a specific endpoint?
정답:
Question No : 5
What is the timeout for the file deletion command in SEDR?
정답:
Question No : 6
Which two functions are supported in the SEDR Management Console? (Choose two)
정답:
Question No : 7
Which step aligns with the "Respond" phase in the NIST Cybersecurity Framework when using SEDR?
정답:
Question No : 8
Which two pieces of information can be viewed when monitoring content distribution in SEPM? (Choose two)
정답:
Question No : 9
When customizing virus scans for an enterprise environment, which SEP option allows admins to reduce scan duration while maintaining coverage?
정답:
Question No : 10
When configuring the Intrusion Prevention Policy, which two options can be customized per signature? (Choose two)
정답:
Question No : 11
What is the primary role of Symantec’s Insight Lookup feature in SEP?
정답:
Question No : 12
How does policy inheritance function within SEPM client groups by default?
정답:
Question No : 13
Which two mechanisms ensure secure communication between SEP clients and the SEPM? (Choose two)
정답:
Question No : 14
What best describes a core installation consideration for the SEDR appliance?
정답:
Question No : 15
When enabling System Lockdown, which file is essential to define the set of allowed applications?
정답: