Information Technology Reference
In-Depth Information
2. Your organization has a central administration site; the Sydney primary site; the
Melbourne primary site; and secondary sites at Canberra, Geelong, and Newcastle.
The Geelong site is a secondary site of the Melbourne site. Clients in the Geelong site
will be using System Center Endpoint Protection. In which site should you deploy the
Endpoint Protection Point Site System role?
a. Central administration site
B. Melbourne
C. Sydney
D. Geelong
3. Which of the following would you configure in an antimalware policy to ensure that
files on volume E were not scanned for malware by the Endpoint Protection client?
a. Advanced settings
B. Real-time protection
C. Exclusion settings
D. Threat overrides
4. Which of the following antimalware policy settings would you configure to have a
system restore point automatically created by the Endpoint Protection client before
cleaning malware from computers?
a.
Real-time protection
Exclusion settings
B.
Advanced settings
C.
Threat overrides
D.
 
Search WWH ::




Custom Search