What options should an administrator uncheck in the database properties if you perform database maintenance in SQL Management Studio?
A. Uncheck "Truncate the database transaction logs" and "Rebuild Indexes" in the General tab of the Database Properties
B. Uncheck "Truncate the database transaction logs" and "Rebuild Indexes" in the General tab of the Administrator Properties
C. Uncheck "Truncate the database transaction logs" and "Rebuild Indexes" in the General tab of the Site Properties
D. Uncheck "Truncate the database transaction logs" and "Rebuild Indexes" in the General tab of the Server Properties
An organization is considering multiple sites for their Symantec Endpoint Protection environment.
What are two reasons that the organization should consider? (Choose two.)
A. Legal constraints
B. Control your hardware and administration costs
C. Content distribution
D. Tolerable downtime
E. Control when your WAN links are used
Which content distribution method can distribute content to all client types and provides validation scheduling?
A. Group Update Provider
B. Internal LiveUpdate
C. Intelligent Updater
D. Management Server
An organization has a group of 500 SEP for Windows Clients running 12.1 RU5. The organization wants to migrate the clients to 14 RU1, but must minimize WAN bandwidth usage. What installation method should the organization use?
A. Push Deployment Wizard
B. Clients Install Package hosted on a local HTTP Server
C. Client Deployment Wizard
D. Auto Upgrade
An organization has four locations setup in their Symantec Endpoint Protection Environment to match the physical sites they have ?NAM, LATAM, EMEA, and APAC. When users travel from site to site, they would like to control which SEPM a client connects to based on the client's proximity to the nearest SEPM server. The location is triggered by IP range assigned by the DHCP of that site.
How can the organization utilize Locations to control which SEPM or set of SEPMs the clients connect to?
A. Assign the Management Server list to the Group with the appropriate SEPM order. (Each SEPM is on the same priority level)
B. Assign the Management Server list to the Location and Group with the appropriate SEPM order. (Each SEPM has its own priority level)
C. Assign the Management Server list to the Location with the appropriate SEPM order. (Each SEPM has its own priority level)
D. Assign the Management Server list to the Location under My Company. (Each SEPM is on the same priority level)
What is the difference between a Block versus a Terminate action, when creating an Application Control rule?
A. A Block action prevents a child process from running. A Terminate action kills the application making the request or the caller process.
B. A Block action excludes the child process from being scanned. A Terminate action prevents the process from running.
C. A Block action places the process in Quarantine. A Terminate action kills the application making the request or the caller process.
D. A Block action prevents the process to be left alone. A Terminate action prevents the process from running.
An organization would like to control the policies that the client uses when connecting over VPN, but wants to use a different set of policies in the office. How should an administrator implement this?
A. Create a Location called VPN and a Group called Office. Allow the client to switch to the VPN location when the user is working remote.
B. Create a Group called VPN and a Location called Office. Allow the client to switch to the VPN location when the user is working remote.
C. Create a Location called VPN and a Location called Office. Allow the client to switch to the VPN location when the user is working remote.
D. Create a Group called VPN and a Group called Office. Move the client to the VPN group when the user is working remotely.
Where does an administrator review logs, after enabling debug logging for client communication on a SEP for Mac client?
A. /Library/Application Support/Symantec/SMC/log/syslog.log
B. /Library/Application Support/Symantec/SMC/debug/als_debug.log
C. /Library/Application Support/Symantec/SMC/debug/smc_debug.log
D. /Library/Application Support/Symantec/SMC/log/sylink.log
What two steps should an administrator take to troubleshoot firewall processing with the Symantec Endpoint Protection client? (Choose two.)
A. Create an exclusion in the Exceptions policy and reproduce the issue
B. Disable the Symantec Endpoint Protection client and reproduce the issue
C. Withdraw the assigned firewall policy and reproduce the issue
D. Add an "Allow All" traffic rule to the assigned firewall policy and reproduce the issue
E. Enable TSE debug on the Symantec Endpoint Protect client and reproduce the issue
Which is an example of legitimate software that Intrusion Protection Systems (IPS) may detect as a threat?
A. Running a P2P software on a network
B. Running a FTP client on a network
C. Running a ley logger on a network
D. Running a vulnerability scanner on a network
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Symantec exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 250-428 exam preparations and Symantec certification application, do not hesitate to visit our Vcedump.com to find your solutions here.