An organization recently experienced an outbreak and is conducting a health check of the environment. What Protection Technology can the SEP team enable to control and monitor the behavior of applications?
Which two (2) criteria are used by Symantec Insight to evaluate binary executables? (Select two.)
What permissions does the Security Analyst Role have?
Which option should an administrator utilize to temporarily or permanently block a file?
What is an appropriate use of a file fingerprint list?
What SEP feature is leveraged when configuring custom IPS?
Which designation should an administrator assign to the computer configured to find unmanaged devices?
What does a ranged query return or exclude?
What type of policy provides a second layer of defense, after the Symantec firewall?
Which default role has the most limited permission in the Integrated Cyber Defense Manager?