Which two Symantec Endpoint Protection components are used to distribute content updates? (Select two.)
A. Group Update Provider (GUP)
B. Shared Insight Cache Server
C. Symantec Protection Center
D. Symantec Endpoint Protection Manager
E. Symantec Insight Database
What is the file scan workflow order when Shared Insight Cache and reputation are enabled?
A. Symantec Insight > Shared Insight Cache server > local client Insight cache
B. Local client Insight cache > Shared Insight Cache server > Symantec Insight
C. Shared Insight Cache server > local client Insight cache > Symantec Insight
D. Local client Insight cache > Symantec Insight > Shared Insight Cache server
Which Symantec Endpoint Protection component enables access to data through ad-hoc reports and charts with pivot tables?
A. Symantec Protection Center
B. Shared Insight Cache Server
C. Symantec Endpoint Protection Manager
D. IT Analytics
Which task should an administrator perform to troubleshoot operation of the Symantec Endpoint Protection embedded database?
A. verify that dbsrv11.exe is listening on port 2638
B. check whether the MSSQLSERVER service is running
C. verify the sqlserver.exe service is running on port 1433
D. check the database transaction logs in X:\Program Files\Microsoft SQL server
Which Symantec Endpoint Protection technology blocks a downloaded program from installing browser plugins?
A. Intrusion Prevention
B. SONAR
C. Application and Device Control
D. Tamper Protection
Which technology can prevent an unknown executable from being downloaded through a browser session?
A. Browser Intrusion Prevention
B. Download Insight
C. Application Control
D. SONAR
Users report abnormal behavior on systems where Symantec Endpoint Protection is installed.
Which tool can an administrator run on the problematic systems to identify the likely cause of the abnormal behavior?
A. smc.exe -stop
B. SymHelp.exe
C. PowerShell.exe
D. CleanWipe.exe
In addition to performance improvements, which two benefits does Insight provide? (Select two.)
A. Reputation scoring for documents
B. Zero-day threat detection
C. Protection against malicious java scripts
D. False positive mitigation
E. Blocking of malicious websites
A financial company enforces a security policy that prevents banking system workstations from connecting to the Internet.
Which Symantec Endpoint Protection technology is ineffective on this company's workstations?
A. Insight
B. Intrusion Prevention
C. Network Threat Protection
D. Browser Intrusion Prevention
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Symantec exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 250-315 exam preparations and Symantec certification application, do not hesitate to visit our Vcedump.com to find your solutions here.