Practice Free 250-604 Exam Online Questions
Which two capabilities are included in SES Complete’s mobile protection features? (Choose two)
- A . Identifying unsafe Wi-Fi connections
- B . Tracking device GPS locations
- C . Detecting sideloaded applications
- D . Blocking VPN use across mobile endpoints
What key configuration setting allows administrators to enforce network-based threat protection on iOS and Android devices using SES Complete?
- A . Enabling Unified Threat Console in the hybrid cloud
- B . Activating Network Integrity Profile under the Threat Detection section
- C . Toggling Threat Landscape Mode from passive to active
- D . Assigning a global exclusion list for all unmanaged devices
What is the name of the cloud-based Management Console that is used to configure and manage an SES Complete implementation?
- A . Symantec Endpoint Security Manager (SESM)
- B . The Integrated Cyber Defense Manager (ICDm)
- C . The Symantec Console (SC)
- D . The Integrated Security Protection Manager (ISPm)
Why is it important to configure real-time threat identification in ICDm?
- A . To accelerate OS patch deployment
- B . To reduce licensing costs
- C . To enable proactive detection and response
- D . To improve email deliverability
Which component acts as the centralized management console in SES Complete?
- A . SEPM
- B . LiveUpdate Administrator
- C . ICDm
- D . SymDiag
What configuration ensures that Threat Defense for Active Directory policies remain aligned with organizational risk management needs?
- A . Weekly manual reset of all audit flags in the SES policy center
- B . Regular review and tuning of threat rules based on detected AD attack trends
- C . Forced registration of domain credentials within mobile endpoint profiles
- D . Deployment of wildcard-based port filters across all OU containers
Why is the use of real-time analysis critical in the context of Threat Defense for Active Directory’s protection strategy?
- A . Because it enables immediate visibility into suspicious AD activity that could indicate an ongoing attack
- B . Because it provides an instant shutdown command for all elevated user accounts
- C . Because it reduces latency in email spam filtering by redirecting logs
- D . Because it correlates backup schedules with login timestamps for user integrity
What challenge may arise if endpoint devices in a hybrid environment are not correctly grouped when transitioning policy control from SEPM to ICDm?
- A . Endpoints may receive duplicate alerts for malware.
- B . Policy drift may occur, resulting in non-compliant configurations.
- C . Devices will lose connectivity with the Symantec Global Intelligence Network.
- D . Policies will be updated only once per month.
What must be considered when configuring policy precedence in a hybrid setup with SEPM and ICDm?
- A . SEPM always overrides ICDm policies
- B . Only one policy type is allowed per site
- C . ICDm policies take precedence over SEPM when both are active
- D . The first applied policy becomes permanent unless manually changed
Which ICDm capability supports identifying threats across multiple endpoints by aggregating alert data?
- A . Unified Incident View
- B . Cloud Lookup Engine
- C . SIEM Synchronization Console
- D . DNS Activity Tracker
