A threat was detected by Auto-Protect on a client system.
Which command can an administrator run to determine whether additional threats exist?
Which is an example of legitimate software that Intrusion Protection Systems (IPS) may detect as a threat?
Which two criteria are used by Symantec Insight to evaluate binary executables? (Select two.)
A company plans to install six Symantec Endpoint Protection Managers (SEPMs) spread evenly across two sites. The administrator needs to direct replication activity to SEPM3 server in Site 1 and SEPM4 in Site 2.
Which two actions should the administrator take to direct replication activity to SEPM3 and SEPM4?
(Select two.)
An administrator is troubleshooting a Symantec Endpoint Protection (SEP) replication.
Which component log should the administrator check to determine whether the communication between the two sites is working correctly?