Which Symantec component is required to enable two factor authentication with VIP on the Integrated Cyber Defense manager (ICDm)?
A. A physical token or a software token
B. A software token and a VIP server
C. A software token and an active directory account
D. A physical token or a secure USB key
Which two (2) options is an administrator able to use to prevent a file from being fasely detected? (Select two)
A. Assign the file a SHA-256 cryptographic hash
B. Add the file to a Whitelist policy
C. Reduce the Intensive Protection setting of the Antimalware policy
D. Register the file with Symantec's False Positive database
E. Rename the file
What does an end-user receive when an administrator utilizes the Invite User feature to distribute the SES client?
A. An email with a link to directly download the SES client
B. An email with a link to a KB article explaining how to install the SES Agent
C. An email with the SES_setup.zip file attached
D. An email with link to register on the ICDm user portal
An endpoint is offline, and the administrator issues a scan command. What happens to the endpoint when it restarts, if it lacks connectivity?
A. The system is scanning when started.
B. The system downloads the content without scanning.
C. The system starts without scanning.
D. The system scans after the content update is downloaded.
What are the Exploit Mitigation security control's mitigation techniques designed to prevent?
A. Packed file execution
B. Misbehaving applications
C. File-less attacks
D. Rootkit downloads
Which Security Control dashboard widget should an administrator utilize to access detailed areas for a given security control ?
A. Learn More
B. Quick Links
C. More Info
D. Latest Tasks
Which two (2) skill areas are critical to the success of incident Response Teams (Select two)
A. Project Management
B. Incident Management
C. Cyber Intelligence
D. Incident Response
E. Threat Analysis
Which option should an administrator utilize to temporarily or permanently block a file?
A. Delete
B. Hide
C. Encrypt
D. Blacklist
Which communication method is utilized within SES to achieve real-time management?
A. Heartbeat
B. Standard polling
C. Push Notification
D. Long polling
Which policy should an administrator edit to utilize the Symantec LiveUpdate server for pre- release content?
A. The Firewall Policy
B. The System Schedule Policy
C. The System Policy
D. The LiveUpdate Policy
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Symantec exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 250-561 exam preparations and Symantec certification application, do not hesitate to visit our Vcedump.com to find your solutions here.