Exam Details

  • Exam Code
    :ST0-134
  • Exam Name
    :Symantec EndPoint Protection 12.1 Technical Assessment
  • Certification
    :Symantec Certified Security program
  • Vendor
    :Symantec
  • Total Questions
    :282 Q&As
  • Last Updated
    :Apr 29, 2025

Symantec Symantec Certified Security program ST0-134 Questions & Answers

  • Question 191:

    An administrator plans to implement a multi-site Symantec Endpoint Protection (SEP) deployment. The administrator needs to determine whether replication is viable without needing to make network firewallchanges or change defaults in SEP.Which port should the administrator verify is open on the path of communication between the two proposed sites?

    A. 1433

    B. 2967

    C. 8014

    D. 8433

  • Question 192:

    What is an appropriate use of a file fingerprint list?

    A. allow unknown files to be downloaded with Insight

    B. prevent programs from running

    C. prevent AntiVirus from scanning a file

    D. allow files to bypass Intrusion Prevention detection

  • Question 193:

    Which step is unnecessary when an administrator creates an application rule set?

    A. define a provider

    B. select a process to apply

    C. select a process to exclude

    D. define rule order

  • Question 194:

    An administrator needs to learn the applications running on a computer. Which step should the administrator take to configure functionality?

    A. configure a local Symantec Endpoint Protection Manager administrator to have rights to view reports only

    B. enable application tracking under communication settings at the site level

    C. enable file fingerprinting on the Symantec Endpoint Protection client

    D. configure pull mode for Application Learning

  • Question 195:

    Which two criteria can an administrator use to determine hosts in a host group? (Select two.)

    A. Subnet

    B. Network Services

    C. Application Protocol

    D. DNS Domain

    E. Network Adapters

  • Question 196:

    A Symantec Endpoint Protection administrator is using System Lockdown in blacklist mode with a file fingerprint list. When testing a client, the administrator notices that at least one of the files on the list is allowed to execute. What is the likely cause of the problem?

    A. The application has been upgraded.

    B. The Application and Device Control policy is in test mode.

    C. A file exception has been added to the Exceptions policy.

    D. The Application and Device Control policy is allowing the file to execute.

  • Question 197:

    A Symantec Endpoint Protection administrator needs to prevent users from modifying files in a specific program folder that is on all client machines. What does the administrator need to configure?

    A. a file and folder exception in the Exception policy

    B. an application rule set in the Application and Device Control policy

    C. a file fingerprint list and System Lockdown

    D. the Tamper Protection settings for the client folder

  • Question 198:

    An administrator tests a new Application and Device Control policy. One of the rule sets being tested blocks the notepad.exe application from running. After pushing the policy to a test client, the administrator finds that notepad.exe is still able to run. The administrator verifies that the rule set is enabled in the Application and Device Control policy. Which two reasons may be preventing the policy from performing the application blocking? (Select two.)

    A. The System Lockdown policy includes notepad.exe in the whitelist.

    B. System Lockdown has been removed from the client.

    C. The Client User Interface Control is set to Client control.

    D. The rule set is in Production mode.

    E. A rule set with conflicting rules exists higher up in the policy.

  • Question 199:

    Which action must a Symantec Endpoint Protection administrator take before creating custom Intrusion Prevention signatures?

    A. change the custom signature order

    B. create a Custom Intrusion Prevention Signature library

    C. define signature variables

    D. enable signature logging

  • Question 200:

    A user is unknowingly about to connect to a malicious website and download a known threat within a .rar file. All Symantec Endpoint Protection technologies are installed on the client's system. In which feature set order must the threat pass through to successfully infect the system?

    A. Download Insight, Firewall, IPS

    B. Firewall, IPS, Download Insight

    C. IPS, Firewall, Download Insight

    D. Download Insight, IPS, Firewall

Related Exams:

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Symantec exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ST0-134 exam preparations and Symantec certification application, do not hesitate to visit our Vcedump.com to find your solutions here.