Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dcdisc65

Page: 1 / 3
Total 21 questions
Exam Code: 250-561                Update: Oct 15, 2025
Exam Name: Endpoint Security Complete - Administration R1

Symantec Endpoint Security Complete - Administration R1 250-561 Exam Dumps: Updated Questions & Answers (October 2025)

Question # 1

Which framework, open and available to any administrator, is utilized to categorize adversarial tactics and for each phase of a cyber attack?

A.

MITRE RESPONSE

B.

MITRE ATT&CK

C.

MITRE ADV&NCE

D.

MITRE ATTACK MATRIX

Question # 2

Which file property does SES utilize to search the VirusTotal website for suspicious file information?

A.

File reputation

B.

File size

C.

File name

D.

File hash

Question # 3

A user downloads and opens a PDF file with Adobe Acrobat. Unknown to the user, a hidden script in the file begins downloading a RAT.

Which Anti-malware engine recognizes that this behavior is inconsistent with normal Acrobat functionality, blocks the

behavior and kills Acrobat?

A.

SONAR

B.

Sapient

C.

IPS

D.

Emulator

Question # 4

After editing and saving a policy, an administrator is prompted with the option to apply the edited policy to any assigned device groups.

What happens to the new version of the policy if the administrator declines the option to apply it?

A.

The policy display is returned to edit mode

B.

The new version of the policy is deleted

C.

An unassigned version of the policy is created

D.

The new version of the policy is added to the "in progress" list

Question # 5

Which report template out format should an administrator utilize to generate graphical reports?

A.

XML

B.

HTML

C.

PFD

D.

XML

Question # 6

Which SES feature helps administrator apply policies based on specific endpoint profiles?

A.

Device Groups

B.

Device Profiles

C.

Policy Bundles

D.

Policy Groups

Question # 7

An administrator learns of a potentially malicious file and wants to proactively prevent the file from ever being executed.

What should the administrator do?

A.

Add the file SHA1 to a blacklist policy

B.

Increase the Antimalware policy Intensity to Level 5

C.

Add the filename and SHA-256 hash to a Blacklist policy

D.

Adjust the Antimalware policy age and prevalence settings

Question # 8

Which security threat uses malicious code to destroy evidence, break systems, or encrypt data?

A.

Execution

B.

Persistence

C.

Impact

D.

Discovery

Question # 9

Which security control is complementary to IPS, providing a second layer of protection against network attacks?

A.

Host Integrity

B.

Antimalware

C.

Firewall

D.

Network Protection

Question # 10

Which policy should an administrator edit to utilize the Symantec LiveUpdate server for pre-release content?

A.

The Firewall Policy

B.

The System Schedule Policy

C.

The System Policy

D.

The LiveUpdate Policy

Page: 1 / 3
Total 21 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 16 Oct 2025