Information Technology Reference
In-Depth Information
Objective review
1.
Correct answers:
B, C, and D
a.
Incorrect:
You can't configure the Endpoint Protection client to retrieve antimal-
ware definition updates from an FTP site.
Correct:
Antimalware definition update files for the Endpoint Protection client can
be retrieved from Microsoft Update/Microsoft Malware Protection Center.
B.
Correct:
Antimalware definition update files for the Endpoint Protection client can
be hosted on a UNC file share.
C.
Correct:
Antimalware definition update files for the Endpoint Protection client can
be hosted through WSUS.
D.
Correct answer:
A
a.
2.
Correct:
You deploy the Endpoint Protection Point Site System role at the top of
the Configuration Manager hierarchy.
Incorrect:
You deploy the Endpoint Protection Point Site System role at the top of
the Configuration Manager hierarchy.
B.
Incorrect:
You deploy the Endpoint Protection Point Site System role at the top of
the Configuration Manager hierarchy.
C.
Incorrect:
You deploy the Endpoint Protection Point Site System role at the top of
the Configuration Manager hierarchy.
D.
Correct answer:
C
a.
3.
Incorrect:
Advanced settings enable you to configure options such as whether to
create a system restore point before cleaning computers, show notification mes-
sages to users, delete quarantined files after a specified number of days, and allow
users to control exclusions.
Incorrect:
Use real-time protection settings to enable real-time protection. If you
enable real-time protection, additional options are available to specify whether to
scan incoming files, outgoing files, or both. You also can specify whether users can
configure real-time protection settings on their computers.
B.
Correct:
Exclusion settings enable you to specify files, locations, file types, and
processes to exclude from the scanning process.
C.
Incorrect:
Threat overrides settings enable you to configure a specific action
(Allow, Remove, or Quarantine) based on a threat name.
D.