Symantec 250-428 Exam
Administration of Symantec Endpoint Protection 14 (Broadcom) (Page 3 )

Updated On: 9-Feb-2026

A financial company enforces a security policy that prevents banking system workstations from connecting to the Internet.
Which Symantec Endpoint Protection technology is ineffective on this company's workstations?

  1. Insight
  2. Intrusion Prevention
  3. Network Threat Protection
  4. Browser Intrusion Prevention

Answer(s): A



Which action does SONAR take before convicting a process?

  1. quarantines the process
  2. blocks suspicious behavior
  3. reboots the system
  4. checks the reputation of the process

Answer(s): D



An administrator is using the SylinkDrop tool to update a Symantec Endpoint Protection client install on a system. The client fails to migrate to the new Symantec Endpoint
Protection Manager (SEPM), which is defined correctly in the Sylink.xml file that was exported from the SEPM.
Which settings must be provided with SylinkDrop to ensure the successful migration to a new Symantec Endpoint Protection environment with additional Group Level Security Settings?

  1. -s "silent"
  2. -t "Tamper Protect"
  3. -r "reboot"
  4. -p "password"

Answer(s): D



A Symantec Endpoint Protection (SEP) administrator is remotely deploying SEP clients, but the clients are failing to install on Windows XP.
What are two possible reasons for preventing installation? (Select two.)

  1. Windows firewall is enabled.
  2. Internet Connection firewall is disabled.
  3. Administrative file shares are enabled.
  4. Simple file sharing is enabled.
  5. Clients are configured for DHCP.

Answer(s): A,D



Which protection engine should be enabled to drop malicious vulnerability scans against a client system?

  1. SONAR
  2. Intrusion Prevention
  3. Tamper Protection
  4. Application and Device Control

Answer(s): B






Post your Comments and Discuss Symantec 250-428 exam prep with other Community members:

Join the 250-428 Discussion