Which two options are supported Symantec Endpoint Manager authentication types? (Select two.)
Employees of an accounting company often take their notebooks to customer sites. The administrator needs to apply a different firewall policy when the notebooks are disconnected from the accounting company's network.
What must the administrator configure to use the two different policies?
Answer : B
A company allows users to create firewall rules. During the course of business, users are accidentally adding rules that block a custom internal application.
Which steps should the Symantec Endpoint Protection administrator take to prevent users from blocking the custom application?
A company needs to forward log data from Data Center A to Data Center B during off peak hours only.
How should the company architect its Symantec Endpoint Protection environment?
Answer : D
Which action does the Shared Insight Cache (SIC) server take when the whitelist reaches maximum capacity?
Answer : C
A Symantec Endpoint Protection administrator needs to prevent users from modifying files in a specific program folder that is on all client machines.
What does the administrator need to configure?
Answer : B
Which two criteria can an administrator use to determine hosts in a host group? (Select two.)