Which two (2) Discovery and Deploy features could an administrator use to enroll MAC endpoints? (Select two)
A. Push Enroll
B. A custom Installation package creator pact
C. A default Direct Installation package
D. Invite User
E. A custom Direct installation package
What are two (2) benefits of a fully cloud managed endpoint protection solution? (Select two)
A. Increased content update frequency
B. Increased visibility
C. Reduced 3rd party licensing cost
D. Reduced database usage
E. Reduced network usage
Which file should an administrator create, resulting Group Policy Object (GPO)?
A. Symantec__Agent_package_x64.zip
B. Symantec__Agent_package_x64.msi
C. Symantec__Agent_package__32-bit.msi
D. Symantec__Agent_package_x64.exe
What happens when an administrator blacklists a file?
A. The file is assigned to the Blacklist task list
B. The file is automatically quarantined
C. The file is assigned to a chosen Blacklist policy
D. The file is assigned to the default Blacklist policy
Which two (2) scan range options are available to an administrator for locating unmanaged endpoints? (Select two)
A. IP range within network
B. IP range within subnet
C. Entire Network
D. Entire Subnet
E. Subnet Range
Which framework, open and available to any administrator, is utilized to categorize adversarial tactics and for each phase of a cyber attack?
A. MITRE RESPONSE
B. MITRE ATTandCK
C. MITRE ADVandNCE
D. MITRE ATTACK MATRIX
Which report template out format should an administrator utilize to generate graphical reports?
A. XML
B. HTML
C. PFD
D. XML
What option must an administrator choose when rolling back a policy assignment to a previous version?
A. Customize
B. Reverse
C. Override
D. Go Back
Which statement best defines Machine Learning?
A. A program that needs user input to perform a task.
B. A program that teams from observing other programs.
C. A program that learns from experience to optimize the output of a task.
D. A program that require data to perform a task.
Which type of security threat is used by attackers to exploit vulnerable applications?
A. Lateral Movement
B. Privilege Escalation
C. Command and Control
D. Credential Access
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Symantec exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 250-561 exam preparations and Symantec certification application, do not hesitate to visit our Vcedump.com to find your solutions here.