Latest Geekcert 250-428 Exam 250-428 Dumps 100% Free Download

One of my colleague recommend me that Geekcert Symantec Certified Specialist Newest 250-428 free download dumps are effective and helpful. Thank goodness I followed up with him and choose Geekcert as my assistance on my Symantec Certified Specialist Newest 250-428 vce dumps Administration of Symantec Endpoint Protection 14 certification exam! I passed my Symantec Symantec Certified Specialist Jan 11,2022 Newest 250-428 vce dumps exam very easily. I was lucky, all my questions in the exams were from my Symantec Symantec Certified Specialist Newest 250-428 pdf dumps.

Geekcert – most reliable and professional 250-428 certification exam material provider. real latest, easily pass. Geekcert – help you prepare for 250-428 certification exams. latest update, most accurate and high pass rate. Geekcert – most reliable and professional 250-428 certification exam material provider. real latest, easily pass.

We Geekcert has our own expert team. They selected and published the latest 250-428 preparation materials from Symantec Official Exam-Center:

The following are the 250-428 free dumps. Go through and check the validity and accuracy of our 250-428 dumps.We have sample questions for 250-428 free dumps. You can download and check the real questions of updated 250-428 dumps.

Question 1:

Refer to the exhibit.

A manufacturing company runs three shifts at their Bristol Sales office. These employees currently share desktops in the B_Desktops group. The administrators need to apply different policies/configurations for each shift. Which step should the administrator take in order to implement shift policies after switching the clients to user mode?

A. create three shift policies for the Bristol group

B. create a group for each shift of users in the Bristol group

C. turn on inheritance for all groups in England

D. turn on Active Directory integration

E. modify the B_Desktops policy

Correct Answer: B

Question 2:

A financial company enforces a security policy that prevents banking system workstations from connecting to the Internet. Which Symantec Endpoint Protection technology is ineffective on this company\’s workstations?

A. Insight

B. Intrusion Prevention

C. Network Threat Protection

D. Browser Intrusion Prevention

Correct Answer: A

Question 3:

A company has an application that requires network traffic in both directions to multiple systems at a specific external domain. A firewall rule was created to allow traffic to and from the external domain, but the rule is blocking incoming traffic. What should an administrator enable in the firewall policy to allow this traffic?

A. TCP resequencing

B. Smart DHCP

C. Reverse DNS Lookup

D. Smart WINS

Correct Answer: C

Question 4:

An administrator selects the Backup files before attempting to repair the Remediations option in the Auto-Protect policies. Which two actions occur when a virus is detected? (Select two.)

A. replace the file with a place holder

B. check the reputation

C. store in Quarantine folder

D. send the file to Symantec Insight

E. encrypt the file

Correct Answer: CE

Question 5:

A threat was detected by Auto-Protect on a client system.

Which command can an administrator run to determine whether additional threats exist?

A. Restart Client Computer

B. Update Content and Scan

C. Enable Network Threat Protection

D. Enable Download Insight

Correct Answer: A

Question 6:

Which Symantec Endpoint Protection Management (SEPM) database option is the default for deployments of fewer than 1,000 clients?

A. EmbeddeD. Using the Sybase SQL Anywhere database that comes with the product

B. On SEPM: Installing Microsoft SQL on the same server as the SEPM

C. External to SEPM: Using a preexisting Microsoft SQL server in the environment

D. EmbeddeD. Using the Microsoft SQL database that comes with the product

Correct Answer: A

Question 7:

A company plans to install six Symantec Endpoint Protection Managers (SEPMs) spread evenly across two sites. The administrator needs to direct replication activity to SEPM3 server in Site 1 and SEPM4 in Site 2. Which two actions should the administrator take to direct replication activity to SEPM3 and SEPM4? (Select two.)

A. Install SEPM3 and SEPM4 after the other SEPMs

B. Install the SQL Server databases on SEPM3 and SEPM4

C. Ensure SEPM3 and SEPM4 are defined as the top priority server in the Site Settings

D. Ensure SEPM3 and SEPM4 are defined as remote servers in the replication partner configuration

E. Install IT Analytics on SEPM3 and SEPM4

Correct Answer: CD

Question 8:

A large-scale virus attack is occurring and a notification condition is configured to send an email whenever viruses infect five computers on the network. A Symantec Endpoint Protection administrator has set a one hour damper period for that notification condition.

How many notifications does the administrator receive after 30 computers are infected in two hours?

A. 1

B. 2

C. 6

D. 15

Correct Answer: B

Question 9:

An administrator is reviewing an Infected Clients Report and notices that a client repeatedly shows the same malware detection. Although the client remediates the files, the infection continues to display in the logs. Which two functions should be enabled to automate enhanced remediation of a detected threat and its related side effects? (Select two.)

A. Risk Tracer

B. Terminate Processes Automatically

C. Early Launch Anti-Malware Driver

D. Stop Service Automatically

E. Stop and Reload AutoProtect

Correct Answer: BD

Question 10:

An administrator needs to configure Secure Socket Layer (SSL) communication for clients. In the httpd.conf file, located on the Symantec Endpoint Protection Manager (SEPM), the administrator removes the hashmark (#) from the text string

displayed below.

#Include conf/ssl/sslForcClients.conf<

Which two tasks must the administrator perform to complete the SSL configuration? (Select two.)

A. edit and change the port to 443

B. restart the Symantec Endpoint Protection Manager Webserver service

C. change the default certificates on the SEPM and reboot

D. change the Management Server List and enable HTTPs

E. change the port in Clients > Group > Policies > Settings > Communication Settings and force the clients to reconnect

Correct Answer: BD

Question 11:

How are Insight results stored?

A. Encrypted on the Symantec Endpoint Protection Manager

B. Unencrypted on the Symantec Endpoint Protection Manager

C. Encrypted on the Symantec Endpoint Protection Client

D. Unencrypted on the Symantec Endpoint Protection Client

Correct Answer: C

Question 12:

A Symantec Endpoint Protection administrator must block traffic from an attacking computer for a specific time period. Where should the administrator adjust the time to block the attacking computer?

A. in the firewall policy, under Protection and Stealth

B. in the firewall policy, under Built in Rules

C. in the group policy, under External Communication Settings

D. in the group policy, under Communication Settings

Correct Answer: A

Question 13:

Where in the Symantec Endpoint Protection (SEP) management console will a SEP administrator find the option to allow all users to enable and disable the client firewall?

A. Client User Interface Control Settings

B. Overview in Firewall Policy

C. Settings in Intrusion Prevention Policy

D. System Lockdown in Group Policy

Correct Answer: A


Question 14:

An administrator plans to implement a multi-site Symantec Endpoint Protection (SEP) deployment. The administrator needs to determine whether replication is viable without having to make network firewall changes or change defaults in SEP.

Which port should the administrator verify is open on the path of communication between the two proposed sites? (Type the port number.)

A. 8443

Correct Answer: A

Question 15:

Which action must a Symantec Endpoint Protection administrator take before creating custom Intrusion Prevention signatures?

A. Change the custom signature order

B. Create a Custom Intrusion Prevention Signature library

C. Define signature variables

D. Enable signature logging

Correct Answer: B