Information Technology Reference
In-Depth Information
Objective review
1.
Correct answers: B, C, and D
a.
Incorrect: You can't configure the Endpoint Protection client to retrieve antimal-
ware definition updates from an FTP site.
Correct: Antimalware definition update files for the Endpoint Protection client can
be retrieved from Microsoft Update/Microsoft Malware Protection Center.
B.
Correct: Antimalware definition update files for the Endpoint Protection client can
be hosted on a UNC file share.
C.
Correct: Antimalware definition update files for the Endpoint Protection client can
be hosted through WSUS.
D.
Correct answer: A
a.
2.
Correct: You deploy the Endpoint Protection Point Site System role at the top of
the Configuration Manager hierarchy.
Incorrect: You deploy the Endpoint Protection Point Site System role at the top of
the Configuration Manager hierarchy.
B.
Incorrect: You deploy the Endpoint Protection Point Site System role at the top of
the Configuration Manager hierarchy.
C.
Incorrect: You deploy the Endpoint Protection Point Site System role at the top of
the Configuration Manager hierarchy.
D.
Correct answer: C
a.
3.
Incorrect: Advanced settings enable you to configure options such as whether to
create a system restore point before cleaning computers, show notification mes-
sages to users, delete quarantined files after a specified number of days, and allow
users to control exclusions.
Incorrect: Use real-time protection settings to enable real-time protection. If you
enable real-time protection, additional options are available to specify whether to
scan incoming files, outgoing files, or both. You also can specify whether users can
configure real-time protection settings on their computers.
B.
Correct: Exclusion settings enable you to specify files, locations, file types, and
processes to exclude from the scanning process.
C.
Incorrect: Threat overrides settings enable you to configure a specific action
(Allow, Remove, or Quarantine) based on a threat name.
D.
Search WWH ::




Custom Search