2013年6月28日星期五

Le plus récent matériel de formation Symantec 250-315

Maintenant, beaucoup de professionnels IT prennent un même point de vue que le test Symantec 250-315 est le tremplin à surmonter la pointe de l'Industrie IT. Beaucoup de professionnels IT mettent les yeux au test Certification Symantec 250-315.


Vous pouvez trouver un meilleur boulot dans l'industrie IT à travers d'obtenir le test Symantec 250-315, la voie à la réussite de votre professionnel sera ouverte pour vous.


Code d'Examen: 250-315

Nom d'Examen: Symantec (Administration of Symantec Endpoint Protection 12.1)

Questions et réponses: 167 Q&As

Il faut une bonne préparation et aussi une série de connaissances professionnelles complètes pour réussir le test Symantec 250-315. La ressourece providée par Pass4Test peut juste s'accorder votre demande.


Au 21er siècle, il manque encore grand nombreux de gens qualifié de IT. Le test Certificat IT est une bonne façon à examiner les hommes de talent. Ce n'est pas un test facile à réussir. Un bon choix de formation est une assurance pour le succès de test. Le test simulation est bien proche que test réel. Vous pouvez réussir 100%, bien que ce soit la première à participer le test.


Le test Symantec 250-315 est une examination de techniques professionnelles dans l'Industrie IT. Pass4Test est un site qui peut vous aider à réussir le test Symantec 250-315 rapidement. Si vous utiliser l'outil de formation avant le test, vous apprendrez tous essences de test Certification Symantec 250-315.


250-315 Démo gratuit à télécharger: http://www.pass4test.fr/250-315.html


NO.1 Which Symantec Endpoint Protection 12.1 component provides single-sign-on to the Symantec
Endpoint Protection Manager and other products, along with cross-product reporting?
A. Symantec Reporting server
B. Symantec Security Information Manager
C. IT Analytics
D. Symantec Protection Center
Answer: D

Symantec examen   250-315 examen   certification 250-315

NO.2 Which Symantec Endpoint Protection 12.1 component uses reputation to evaluate a file?
A. Shared Insight Cache server
B. Symantec Endpoint Protection client
C. Symantec Endpoint Protection Manager
D. LiveUpdate Administrator server
Answer: B

Symantec   250-315   250-315   250-315

NO.3 A company is experiencing a malware outbreak. The company deploys Symantec Endpoint Protection
12.1, with only Virus and Spyware Protection, Application and Device Control, and Intrusion Prevention
technologies. Why would Intrusion Prevention be unable to block all communications from an attacking
host?
A. Intrusion Prevention needs the firewall component to block all traffic from the attacking host.
B. Intrusion Prevention blocks the attack only if the administrator wrote a signature for it.
C. Intrusion Prevention definitions are out-of-date.
D. Intrusion Prevention is set to log only.
Answer: A

certification Symantec   250-315   250-315   250-315

NO.4 How many Symantec Endpoint Protection Managers can be connected to an embedded database?
A. 1
B. 2
C. 5
D. 10
Answer: A

Symantec examen   250-315   250-315   250-315 examen   250-315

NO.5 Which component is required in order to run Symantec Endpoint Protection 12.1 protection
technologies?
A. Symantec Endpoint Protection Manager
B. Symantec Endpoint Protection client
C. LiveUpdate Administrator server
D. Symantec Protection Center
Answer: B

certification Symantec   250-315   250-315 examen

NO.6 How can an administrator manage multiple, independent companies from one database while
maintaining independent groups, computers, and policies?
A. Set up limited administrators with appropriate rights.
B. Set up separate domains.
C. Set up additional sites using a single database.
D. Set up separate locations and turn off inheritance.
Answer: B

Symantec examen   certification 250-315   250-315   250-315

NO.7 How does the Intrusion Prevention System add an additional layer of protection to Network Threat
Protection?
A. It inspects the TCP packet headers and tracks the sequence number.
B. It performs deep packet inspection, reading the packet headers, and data portion.
C. It examines TCP/IP traffic from the application and traces the source of the traffic.
D. It monitors IP datagrams for abnormalities.
Answer: B

certification Symantec   250-315   250-315 examen   250-315 examen   250-315 examen

NO.8 A financial company has a security policy that prevents banking system workstations from connecting to
the internet. Which Symantec Endpoint Protection 12.1 protection technology will be prevented from
working on the company's workstations?
A. Insight
B. Application and Device Control
C. Network Threat Protection
D. LiveUpdate
Answer: A

certification Symantec   250-315   certification 250-315   250-315

NO.9 Which Symantec Endpoint Protection 12.1 defense mechanism provides protection against worms like
W32.Silly.FDC, which propagate from system to system through the use of autorun.inf files?
A. Application Control
B. SONAR
C. Client Firewall
D. Exceptions
Answer: A

Symantec examen   250-315   certification 250-315   250-315   certification 250-315   certification 250-315

NO.10 Which two objects in the Symantec Endpoint Protection Manager console describe the most granular
level to which a policy can be applied? (Select two.)
A. Site
B. Domain
C. Group
D. Location
E. Computer
F. User
Answer: C,D

certification Symantec   250-315   certification 250-315

NO.11 Which Symantec Endpoint Protection 12.1 component uses Sybase SQL Anywhere?
A. Symantec Endpoint Protection Manager embedded database
B. Symantec Endpoint Protection Manager remote database
C. LiveUpdate Administrator server
D. Shared Insight Cache server
Answer: A

Symantec   250-315 examen   250-315   certification 250-315   certification 250-315   250-315 examen

NO.12 According to Symantec, what is a botnet.?
A. systems infected with the same virus strain
B. groups of systems performing remote tasks without the users' knowledge
C. groups of computers configured to steal credit card records
D. compromised systems opening communication to an IRC channel
Answer: B

Symantec   250-315   certification 250-315   250-315   250-315 examen

NO.13 A company with one site has a factory with computers in the manufacturing area. Both factory
managers and operators need to log in to these shared computers. Different policies will be applied
depending on whether the individual logging in to the machine is a manager or an operator. Which
Symantec Endpoint Protection 12.1 feature provides this ability?
A. Computer mode
B. Active Directory synchronization
C. User mode
D. Console authentication
Answer: C

Symantec   250-315   250-315 examen   250-315   250-315 examen

NO.14 An administrator is logged in to the Symantec Endpoint Protection Manager (SEPM) console for a
system named SEPM01. The groups and policies that were previously in the SEPM01 console are
unavailable and have been replaced with unfamiliar groups and policies. What was a possible reason for
this change?
A. The administrator was modified from using Computer mode to User mode.
B. The administrator was logged in to the incorrect domain for SEPM01.
C. The administrator was changed from a limited administrator to a system administrator.
D. The administrator was using the Web console instead of the Java console.
Answer: B

Symantec examen   250-315   250-315   250-315   250-315

NO.15 Which Symantec Endpoint Protection 12.1 component provides services to improve the performance
of virtual client scanning?
A. Shared Insight Cache server
B. LiveUpdate Administrator server
C. Symantec Protection Center
D. Group Update Provider
Answer: A

Symantec   250-315 examen   250-315 examen   250-315   certification 250-315

NO.16 Which Symantec Endpoint Protection 12.1 protection technology provides the primary protection layers
against zero-day network attacks?
A. SONAR
B. Client Firewall
C. Intrusion Prevention
D. System Lockdown
Answer: C

certification Symantec   250-315   250-315 examen   250-315   250-315

NO.17 Drive-by downloads are a common vector of infections. Some of these attacks use encryption to bypass
traditional defense mechanisms. Which Symantec Endpoint Protection 12.1 protection technology blocks
such obfuscated attacks?
A. SONAR
B. Bloodhound heuristic virus detection
C. Client Firewall
D. Browser Intrusion Prevention
Answer: D

Symantec   certification 250-315   certification 250-315   250-315 examen   250-315   certification 250-315

NO.18 The fake antivirus family "PC scout" infects systems with a similar method regardless of its variant.
Which SONAR sub-feature can block new variants of the same family, based on sequence of events?
A. artificial intelligence
B. behavioral heuristic
C. human authored signatures
D. behavioral policy lockdown
Answer: C

Symantec   250-315   250-315 examen   250-315 examen

NO.19 In addition to performance improvements, which two benefits does Insight provide? (Select two.)
A. reputation scoring for documents
B. zero-day threat detection
C. protection against system file modifications
D. false positive mitigation
E. blocking of malicious websites
Answer: B,D

Symantec   250-315 examen   250-315

NO.20 Which Symantec Endpoint Protection 12.1 component improves performance because known good
files are skipped?
A. LiveUpdate Administrator server
B. Group Update Provider
C. Shared Insight Cache server
D. Central Quarantine server
Answer: C

Symantec   250-315   250-315   certification 250-315   certification 250-315

La partie plus nouvelle de test Certification Symantec 250-315 est disponible à télécharger gratuitement dans le site de Pass4Test. Les exercices de Pass4Test sont bien proches de test réel Symantec 250-315. En comparaison les Q&As dans les autres sites, vous trouverez que les nôtres sont beaucoup plus complets. Les Q&As de Pass4Test sont tout recherchés par les experts de Pass4Test, y compris le test simulation.


没有评论:

发表评论