Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

250-561 Symantec Endpoint Security Complete - Administration R1 Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Symantec 250-561 Endpoint Security Complete - Administration R1 certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 2
Total 70 questions

Which file property does SES utilize to search the VirusTotal website for suspicious file information?

A.

File reputation

B.

File size

C.

File name

D.

File hash

Which framework, open and available to any administrator, is utilized to categorize adversarial tactics and for each phase of a cyber attack?

A.

MITRE RESPONSE

B.

MITRE ATT&CK

C.

MITRE ADV&NCE

D.

MITRE ATTACK MATRIX

Which statement best describes Artificial Intelligence?

A.

A program that automates tasks with a static set of instructions

B.

A program that can predict when a task should be performed

C.

A program that is autonomous and needs training to perform a task

D.

A program that learns from experience and perform autonomous tasks

Which technique randomizes the e memory address map with Memory Exploit Mitigation?

A.

SEHOP

B.

ROPHEAP

C.

ASLR

D.

ForceDEP

What does an end-user receive when an administrator utilizes the Invite User feature to distribute the SES client?

A.

An email with a link to directly download the SES client

B.

An email with a link to a KB article explaining how to install the SES Agent

C.

An email with the SES_setup.zip file attached

D.

An email with link to register on the ICDm user portal

What are two (2) benefits of a fully cloud managed endpoint protection solution? (Select two)

A.

Increased content update frequency

B.

Increased visibility

C.

Reduced 3rd party licensing cost

D.

Reduced database usage

E.

Reduced network usage

Which dashboard should an administrator access to view the current health of the environment?

A.

The Antimalware Dashboard

B.

The SES Dashboard

C.

The Device Integrity Dashboard

D.

The Security Control Dashboard

Which Anti-malware technology should an administrator utilize to expose the malicious nature of a file created with a custom packet?

A.

Sandbox

B.

SONAR

C.

Reputation

D.

Emulator

Files are blocked by hash in the blacklist policy.

Which algorithm is supported, in addition to MD5?

A.

SHA256

B.

SHA256 "salted"

C.

MD5 "Salted"

D.

SHA2

Which Antimalware technology is used after all local resources have been exhausted?

A.

Sapient

B.

ITCS

C.

Emulator

D.

Reputation

In the ICDm, administrators are assisted by the My Task view. Which automation type creates the tasks within the console?

A.

Artificial Intelligence

B.

Machine Learning

C.

Advanced Machine Learning

D.

Administrator defined rules

Which SES advanced feature detects malware by consulting a training model composed of known good and known bad fries?

A.

Signatures

B.

Advanced Machine Learning

C.

Reputation

D.

Artificial Intelligence

Which alert rule category includes events that are generated about the cloud console?

A.

Security

B.

Diagnostic

C.

System

D.

Application Activity

A user downloads and opens a PDF file with Adobe Acrobat. Unknown to the user, a hidden script in the file begins downloading a RAT.

Which Anti-malware engine recognizes that this behavior is inconsistent with normal Acrobat functionality, blocks the

behavior and kills Acrobat?

A.

SONAR

B.

Sapient

C.

IPS

D.

Emulator

Which designation should an administrator assign to the computer configured to find unmanaged devices?

A.

Discovery Broker

B.

Discovery Agent

C.

Discovery Manager

D.

Discovery Device

Which SES feature helps administrator apply policies based on specific endpoint profiles?

A.

Device Groups

B.

Device Profiles

C.

Policy Bundles

D.

Policy Groups

What happens when an administrator blacklists a file?

A.

The file is assigned to the Blacklist task list

B.

The file is automatically quarantined

C.

The file is assigned to a chosen Blacklist policy

D.

The file is assigned to the default Blacklist policy

An administrator needs to create a new Report Template that will be used to track firewall activity. Which two (2) report template settings are optional? (Select 2)

A.

Output format

B.

Generation schedule

C.

Email recipients

D.

Time frame

E.

Size restrictions

The ICDm has generated a blacklist task due to malicious traffic detection. Which SES component was utilized to make that detection?

A.

Antimalware

B.

Reputation

C.

Firewall

D.

IPS

Which option should an administrator utilize to temporarily or permanently block a file?

A.

Delete

B.

Hide

C.

Encrypt

D.

Blacklist

Page: 1 / 2
Total 70 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved