QUESTION NO: 1
Which installation type options are available when defining Client Install Settings?
A. Interactive, Silent, and Unattended
B. Interactive, Restart, and Silent
C. Restart, Silent, and Unmanaged
D. Enable, Log, and Silent
QUESTION NO: 2
In which Client Management Log can you identify when the client last connected to the Symantec Endpoint Protection Manager?
QUESTION NO: 3
Which log type displays configured firewall connections?
QUESTION NO: 4
What are the three configurable actions in TruScan Proactive Threat Scan? (Choose three.)
A. log suspect process only
B. set a public SNMP trap
C. quarantine suspect process
D. terminate the suspect process
E. generate dump of system state
F. suspend the suspect process
QUESTION NO: 5
Which firewall technique helps prevent OS fingerprinting?
A. randomize TTL value
B. close the IDENT port
C. use varying ranges of ephemeral ports
D. set QOS values to 0
QUESTION NO: 6
Which two engines does Symantec Intrusion Prevention contain that identify attack signatures? (Choose two.)
A. protocol anomaly based engine
B. stream based engine
C. packet based engine
D. inference based engine
E. reputation based engine