250-428 Symantec Administration of Symantec Endpoint Protection 14 Free Practice Exam Questions (2025 Updated)
Prepare effectively for your Symantec 250-428 Administration of Symantec Endpoint Protection 14 certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.
What Symantec Best Practice is recommended when setting up Active Directory integration with the Symantec Endpoint protection Manager?
A Symantec Endpoint Protection (SEP) client uses a management server list with three management servers in the priority 1 list.
Which mechanism does the SEP client use to select an alternate management server if the currently selected management server is unavailable?
What does SONAR use to reduce false positives?
A Symantec Endpoint Protection administrator needs to comply with a service level agreement stipulating that all definitions must be internally quality assurance tested before being deployed to customers.
Which step should the administrator take?
An organization is troubleshooting a false positive detection with WS.Respulation.1 Signature on an unmanaged SEP client.
What are the steps to create an exclusion on the unmanaged SEP Client?
What is the file scan workflow order when Shared Insight Cache and reputation are enabled?
A company plans to install six Symantec Endpoint Protection Managers (SEPMs) spread evenly across two sites. The administrator needs to direct replication activity to SEPM3 server in Site 1 and SEPM4 in Site 2.
Which two actions should the administrator take to direct replication activity to SEPM3 and SEPM4? (Select two.)
Which action does the Shared Insight Cache (SIC) server take when the whitelist reaches maximum capacity?
An administrator is responsible for the Symantec Endpoint Protection architecture of a large, multi-national company with three regionalized data centers. The administrator needs to collect data from clients; however, the collected data must stay in the local regional data center. Communication between the regional data centers is allowed 20 hours a day.
How should the administrator architect this organization?
An administrator is re-adding an existing Replication Partner to the local Symantec Endpoint Protection Manager site.
Which two parameters are required to re-establish this replication partnership? (Select two.)
Which policy should an administrator modify to enable Virtual Image Exception (VIE) functionality?
A Symantec Endpoint Protection administrator is using System Lockdown in blacklist mode with a file fingerprint list. When testing a client, the administrator notices that at least one of the files on the list is allowed to execute.
What is the likely cause of the problem?
An administrator plans to implement a multi-site Symantec Endpoint Protection (SEP) deployment. The administrator needs to determine whether replication is viable without needing to make network firewall changes or change defaults in SEP.
Which port should the administrator verify is open on the path of communication between the two proposed sites?
Where can an administrator obtain the Sylink.xml file?
When can an administrator add a new replication partner?
Which client log shows that a client is downloading content from its designated source?
An administrator selects the Backup files before attempting to repair the Remediations option in the Auto-Protect policies.
Which two actions occur when a virus is detected? (Select two.)
You have executed the vxdg -g diskgroup adddisk disk_name= command.
Which switch needs to be added to force VxVM to take the disk media name of the failed disk and assign it to the new replacement disk?
Which two options are supported Symantec Endpoint Manager authentication types? (Select two.)
A company has an application that requires network traffic in both directions to multiple systems at a specific external domain. A firewall rule was created to allow traffic to and from the external domain, but the rule is blocking incoming traffic.
What should an administrator enable in the firewall policy to allow this traffic?