Symantec 250-550 Exam
Symantec Endpoint Security Planning Implementation and Administration R1 (Page 4 )

Updated On: 7-Feb-2026

Which file should an administrator create, resulting Group Policy Object (GPO)?

  1. Symantec__Agent_package_x64.zip
  2. Symantec__Agent_package_x64.msi
  3. Symantec__Agent_package__32-bit.msi
  4. Symantec__Agent_package_x64.exe

Answer(s): C



Which SEPM-generated element is required for an administrator to complete the enrollment of SEPM to the cloud console?

  1. Token
  2. SEPM password
  3. Certificate key pair
  4. SQL password

Answer(s): A



Which two (2) steps should an administrator take to guard against re-occurring threats? (Select two)

  1. Confirm that daily active and weekly full scans take place on all endpoints
  2. Verify that all endpoints receive scheduled Live-Update content
  3. Use Power Eraser to clean endpoint Windows registries
  4. Add endpoints to a high security group and assign a restrictive Antimalware policy to the group
  5. Quarantine affected endpoints

Answer(s): C,E



Which security threat uses malicious code to destroy evidence, break systems, or encrypt data?

  1. Execution
  2. Persistence
  3. Impact
  4. Discovery

Answer(s): A



Which default role has the most limited permission in the Integrated Cyber Defense Manager?

  1. Restricted Administrator
  2. Limited Administrator
  3. Server Administrator
  4. Endpoint Console Domain Administrator

Answer(s): C






Post your Comments and Discuss Symantec 250-550 exam prep with other Community members:

Join the 250-550 Discussion