A company is concerned that its clients may be out-of-date and it wants to ensure that all running applications are protected with Symantec's latest definitions, even if they are unavailable on the Symantec Endpoint Protection 12.1 (SEP) client. How could the company configure SEP to achieve this goal?
A. Enable SONAR with High Risk detections set to Quarantine.
B. Enable Insight Lookup as part of a daily scheduled scan.
C. Enable Insight for Community and Symantec Trusted Files.
D. Enable and apply an Intrusion Prevention policy.
Which Symantec Endpoint Protection 12.1 feature allows an administrator to prevent users from downloading files that are unsafe?
A. SONAR
B. Insight
C. Application Control
D. Trusted Web Domain exceptions
A clean file in a proprietary application has been quarantined by SONAR. How can an administrator fix the broken application from the Symantec Endpoint Protection Manager console?
A. Restore the application with the Client Deployment Wizard.
B. Allow the application from the Monitor Logs view.
C. Run the Enable Auto-Protect command on the client.
D. Run a new scan with a newer set of definitions.
An administrator is reviewing risk logs in the Symantec Endpoint Protection Manager (SEPM) and notices that some entries list that the "Risk was partially removed". The administrator wants to determine whether additional steps are necessary to remediate the threat. How should the administrator proceed?
A. Review the threat writeup and run a full system scan on the machine.
B. Perform a repair of the Symantec Endpoint Protection install on the machine.
C. Submit infected file to Security Response to see if it is a new variant.
D. Change remediation actions in the Virus and Spyware Protection policy in the SEPM.
A company is deploying Symantec Endpoint Protection 12.1 and configuring remediation options within the Virus and Spyware Protection policy. They are considering enabling "Terminate processes automatically" within the remediation options. If this feature is enabled, which two characteristics will the user see when the client must terminate a process to remove or repair a risk? (Select two.)
A. When this option is enabled, the client automatically takes the necessary action without notifying users.
B. When a restart is required, the machine automatically reboots and the user is unable to opt out of the restart.
C. When this option is enabled, the client notifies the user of ending processes to mitigate the threat.
D. When this option is enabled, the client generates an entry in the Risk logs that a process was terminated automatically.
E. When a restart is required, the user is allowed to save data and close open applications or to opt out of the restart.
Where is a file encrypted and saved to when the "Backup files before attempting to repair them" setting is enabled?
A. the local Windows Temp (C\Windows\Temp) directory
B. the local Quarantine folder
C. the FileBackup folder within the Application Data\Symantec directory
D. the local Symantec Endpoint Protection Temp folder
In which two situations would Symantec Endpoint Protection 12.1 (SEP) generate a Left Alone action? (Select two.)
A. Another scan is in progress.
B. The detected file is in use.
C. There are limited permissions to the file on the system.
D. The file is marked for deletion by Windows on reboot.
E. Virus definitions are corrupt or missing.
An administrator set the remediation options for Security Risks to the defaults (Quarantine, then Delete). However, the security team is the only team authorized to have Hack Tools on their systems. Which two steps must the administrator complete to accomplish this? (Select two.)
A. Create a specific group for Security Team.
B. Turn on inheritance for the Security Team group.
C. Assign a Virus and Spyware Protection policy with customized remediation options set.
D. Set a specific location for the My Company group.
E. Unlock the padlock in Auto-Protect for Remote Access.
A company is building a new Symantec Endpoint Protection Manager and is setting the remediation actions for threats in the Virus and Spyware Protection policy. For security risks, the first action is set to Repair and the second action is Quarantine. In this environment, Symantec Endpoint Protection 12.1 (SEP) has been deployed to a small group of clients for testing. Which condition would cause Auto-Protect to stop sending notifications and stop logging the event after three detections?
A. A client continuously downloads the same security risk.
B. File System Auto Protect is malfunctioning on the SEP Client.
C. SEP services on the client are stopped.
D. SEP is unable to read virus definitions.
All email Auto-Protect options are disabled, and an administrator receives an email from an associate with a .zip file attached. There are three files in the .zip file that are needed for the administrator's presentation the next day. What neither of them realize is that one of the files is infected with a virus. When will File System Auto-Protect detect this infected file?
A. when the email is opened
B. when the .zip file is opened
C. when the .zip file is saved to the administrator's desktop
D. when the email is closed
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Symantec exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ST0-134 exam preparations and Symantec certification application, do not hesitate to visit our Vcedump.com to find your solutions here.