Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Symantec SCS Certification 250-561 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam 250-561 Premium Access

View all detail and faqs for the 250-561 exam


457 Students Passed

88% Average Score

97% Same Questions
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

What characterizes an emerging threat in comparison to traditional threat?

Options:

A.

Emerging threats use new techniques and 0-day vulnerability to propagate.

B.

Emerging threats requires artificial intelligence to be detected.

C.

Emerging threats are undetectable by signature based engines.

D.

Emerging threats are more sophisticated than traditional threats.

Questions # 2:

An administrator selects the Discovered Items list in the ICDm to investigate a recent surge in suspicious file activity. What should an administrator do to display only high risk files?

Options:

A.

Apply a list control

B.

Apply a search rule

C.

Apply a list filter

D.

Apply a search modifier

Questions # 3:

Which SES security control protects against threats that may occur in the Impact phase?

Options:

A.

Device Control

B.

IPS

C.

Antimalware

D.

Firewall

Questions # 4:

An administrator is evaluating an organization's computers for an upcoming SES deployment. Which computer meets the pre-requisites for the SES client?

Options:

A.

A computer running Mac OS X 10.8 with 500 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processor

B.

A computer running Mac OS X 10.14 with 400 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processor

C.

A computer running Windows 10 with 400 MB of disk space, 2 GB of RAM, and a 2.4 GHz Intel Pentium 4 processor

D.

A computer running Windows 8 with 380 MB of disk space, 2 GB of RAM, and a 2.8 GHz Intel Pentium 4 processor

Questions # 5:

What are the Exploit Mitigation security control's mitigation techniques designed to prevent?

Options:

A.

Packed file execution

B.

Misbehaving applications

C.

File-less attacks

D.

Rootkit downloads

Questions # 6:

Which Symantec component is required to enable two factor authentication with VIP on the Integrated Cyber Defense manager (ICDm)?

Options:

A.

A physical token or a software token

B.

A software token and a VIP server

C.

A software token and an active directory account

D.

A physical token or a secure USB key

Questions # 7:

Which report template type should an administrator utilize to create a daily summary of network threats detected?

Options:

A.

Network Risk Report

B.

Blocked Threats Report

C.

Intrusion Prevention Report

D.

Access Violation Report

Questions # 8:

Which alert rule category includes events that are generated about the cloud console?

Options:

A.

Security

B.

Diagnostic

C.

System

D.

Application Activity

Questions # 9:

Which policy should an administrator edit to utilize the Symantec LiveUpdate server for pre-release content?

Options:

A.

The Firewall Policy

B.

The System Schedule Policy

C.

The System Policy

D.

The LiveUpdate Policy

Questions # 10:

Which Firewall Stealth setting prevents OS fingerprinting by sending erroneous OS information back to the attacker?

Options:

A.

Disable OS fingerprint profiling

B.

Disable OS fingerprint detection

C.

Enable OS fingerprint masqueradi

D.

Enable OS fingerprint protection

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.