ST0-135 Symantec Network Access Control 12 Technical Exam Set 1

Which Symantec product can have Symantec Network Access Control functionality enabled?


Options are :

  • Symantec AntiVirus 10.2
  • Symantec Critical System Protection 5.2
  • Symantec Endpoint Protection 12.1 (Correct)
  • Symantec Client Security 3.0

Answer : Symantec Endpoint Protection 12.1

Which enforcement technology has the ability to deploy the On-Demand client?


Options are :

  • Gateway Enforcer (Correct)
  • Integrated Enforcer for Microsoft Network Access Protection
  • Integrated Enforcer for Microsoft DHCP Server
  • LAN Enforcer

Answer : Gateway Enforcer

What are two primary purposes of Symantec Network Access Control? (Select two.)


Options are :

  • place a non-compliant endpoint into a captive portal
  • install new operating systems to client workstations
  • prevent out-of-compliance systems from impacting production resources (Correct)
  • check endpoint computers' Host Integrity compliance periodically (Correct)
  • update policies on the Symantec Endpoint Protection Manager

Answer : prevent out-of-compliance systems from impacting production resources check endpoint computers' Host Integrity compliance periodically

On a LAN Enforcer, which command displays the current mab status?


Options are :

  • mab show (Correct)
  • mab enable
  • mab status
  • mab live

Answer : mab show

What can trigger a Symantec Endpoint Protection client to switch locations?


Options are :

  • Client receives a new Host Integrity policy.
  • Client's network address changes. (Correct)
  • Client's group policy communication settings change.
  • Client restarts

Answer : Client's network address changes.

What happens in an 802.1x environment that depends on Active Directory, if the Active Directory server is offline?


Options are :

  • User Authentication will be unavailable. (Correct)
  • Host Integrity results will be ignored.
  • User Authentication will be set to pass.
  • Everyone will be allowed through the LAN Enforcer.

Answer : User Authentication will be unavailable.

How many additional client packages become available when a Symantec Endpoint Protection Manager has been upgraded with Symantec Network Access Control?


Options are :

  • 1
  • 2 (Correct)
  • 3
  • 0

Answer : 2

Which Host Integrity template policies are included with Symantec Network Access Control?


Options are :

  • download a file, Registry: Set registry file, Registry: Increment registry DWORD value
  • antivirus requirement, firewall requirement, service pack requirement
  • check Host Integrity every X minutes, allow the user to cancel remediation, continue to check requirements after one fails
  • enforce password complexity, WSUS waiting packages are installed, terminate application with a certain fingerprint (Correct)

Answer : enforce password complexity, WSUS waiting packages are installed, terminate application with a certain fingerprint

What is the Symantec recommended first step in upgrading the Symantec Endpoint Protection Manager to the next release?


Options are :

  • Enable Local Authentication.
  • Backup the database. (Correct)
  • Turn off replication.
  • Stop the Symantec Endpoint Protection Manager service.

Answer : Backup the database.

What are two capabilities of the Symantec Network Access Control client? (Select two.)


Options are :

  • execute custom scripts (Correct)
  • check for third party security software (Correct)
  • provide SONAR protection
  • provide Network Threat Protection
  • scan for viruses

Answer : execute custom scripts check for third party security software

Which technology is contained in the Symantec Network Access Control agent?


Options are :

  • Firewall
  • Host Compliance (Correct)
  • Intrusion Prevention
  • Antivirus

Answer : Host Compliance

Besides a LAN Enforcer, which two components are required for transparent mode? (Select two.)


Options are :

  • Symantec Endpoint Protection Manager (Correct)
  • ACLs and a firewall enabled in the Enforcer
  • VPN remote access device
  • 802.1x capable switch (Correct)
  • RADIUS server upstream of LAN Enforcer

Answer : Symantec Endpoint Protection Manager 802.1x capable switch

A computer that has been taken outside of an organization's network is unable to gain access to any network resources. The Endpoint Protection Client reports that Host Integrity has failed and is quarantined. What is the most likely cause of the failure?


Options are :

  • Applying Host Integrity policy to locations is unsupported.
  • The firewall policy is unavailable on the client computer because the endpoint is unable to download the policy.
  • The client is unable to auto-remediate because remediation resources are inaccessible externally. (Correct)
  • The client cannot authenticate through an Enforcer appliance.

Answer : The client is unable to auto-remediate because remediation resources are inaccessible externally.

An employee has an employer-issued laptop with Symantec Endpoint Protection client installed. Symantec Network Access Control is enabled on the laptop. Employees are permitted to connect from a remote network to a corporate network via a VPN connection. The clients connect through a Gateway Enforcer to access the corporate network. What happens first when the employee connects to the corporate network from home though the VPN tunnel?


Options are :

  • An On-Demand client is downloaded.
  • A LiveUpdate occurs to update Host Integrity templates.
  • The client computer provides compliance information to the Gateway Enforcer. (Correct)
  • The client computer provides compliance information directly to the Symantec Endpoint Protection Manager.

Answer : The client computer provides compliance information to the Gateway Enforcer.

When installing the Symantec Network Access Control with an external database, what needs to be installed on the Symantec Endpoint Protection Manager prior to installing the manager software?


Options are :

  • Apache web server
  • Apache Tomcat
  • Microsoft IIS
  • Microsoft SQL client tools (Correct)

Answer : Microsoft SQL client tools

What is the most likely cause of a Gateway Enforcer log entry indicating that an endpoint has been 'Rejected'?


Options are :

  • Host Integrity has failed on the endpoint.
  • Port 39999 is blocked on the endpoint. (Correct)
  • Host Integrity failed but was told to pass
  • Port 69999 is blocked on the endpoint.

Answer : Port 39999 is blocked on the endpoint.

Where are Symantec Network Access Control client packages found on the Symantec Endpoint Protection Manager?


Options are :

  • Policies > Policy Components
  • Clients > Install Packages
  • Client > Policies
  • Admin > Install Packages (Correct)

Answer : Admin > Install Packages

What happens when the Symantec Endpoint Protection Manager is upgraded to include Symantic Network Access Control functionality?


Options are :

  • Client without Host integrity policies get dropped into Quarantine.
  • The host integrity policy is enabled in the policy Library. (Correct)
  • A Symantec Network Access Control Client is deployed to all clients.
  • Network Access Control has to be enabled manually in the Manager

Answer : The host integrity policy is enabled in the policy Library.

What is a characteristic of the Symantec Network Access Control Integrated Enforcer for Integrated Enforcers?


Options are :

  • It requires a DHCP Proxy.
  • It is installed as an appliance.
  • It provides 802.1x enforcement.
  • It is only available as a plug-in. (Correct)

Answer : It is only available as a plug-in.

After accessing the network, how is the functionality of the On-Demand client demonstrated?


Options are :

  • Assue an ipconfig /renew.
  • Attempt to view a web page. (Correct)
  • See if a valid IP address is assigned.
  • Attempt to ping the Symantec Endpoint Protection Manager.

Answer : Attempt to view a web page.

When re-imaging the Enforcer via the serial connection, which step must be performed first?


Options are :

  • Set up remote terminal type for VT-UTF8.
  • Assign a valid IP address to the Enforcer.
  • Enable console redirection in the appliance BIOS. (Correct)
  • Enable Telnet on the remote terminal.

Answer : Enable console redirection in the appliance BIOS.

What is a valid deployment methodology for updating the version of Symantec Network Access Control client?


Options are :

  • Import the updated client to the Symantec Endpoint Protection Manager as a client package and all clients will update automatically.
  • Execute the client patch on the Symantec Endpoint Protection Manager and it will be distributed to all clients automatically.
  • Apply the update to the Enforcer and the update will be applied to each client when it is challenged.
  • Use Auto-Upgrade to update groups of clients through the Symantec Endpoint Protection Manager with the new client package. (Correct)

Answer : Use Auto-Upgrade to update groups of clients through the Symantec Endpoint Protection Manager with the new client package.

Which two methods are recommended by Symantec for backing up an embedded database? (Select two.)


Options are :

  • Copy the contents of the [drive]: Program Files Symantec Symantec Endpoint Protection Manager data folder.
  • Use Symantec authorized third party backup tools to backup the database instance.
  • Run the Database Backup and Restore wizard found within the Symantec Endpoint Protection Manager Program Group. (Correct)
  • Execute the backup from the Symantec Endpoint Protection Manager Console on the Home page.
  • Select backup from the Symantec Endpoint Protection Manager Console on the Admin page. (Correct)

Answer : Run the Database Backup and Restore wizard found within the Symantec Endpoint Protection Manager Program Group. Select backup from the Symantec Endpoint Protection Manager Console on the Admin page.

Which policy type does Symantec Network Access Control client use?


Options are :

  • Application Control
  • Host Integrity (Correct)
  • Virus and Spyware
  • Intrusion Prevention

Answer : Host Integrity

How can devices, such as printers or IP telephones, be excluded from being blocked by the Symantec Network Access Control Integrated Enforcer?


Options are :

  • Configure MAC Authentication Bypass on the Symantec Network Access Control Integrated Enforcer.
  • Configure a Trusted Host list on the Symantec Endpoint Protection Manager. (Correct)
  • Configure MAC Authentication Bypass on the Symantec Endpoint Protection Manager.
  • Configure a Trusted Vendor list on the Symantec Endpoint Protection Manager.

Answer : Configure a Trusted Host list on the Symantec Endpoint Protection Manager.

When testing 802.1x environments with LAN enforcement, where can an administrator confirm whether the user credentials provided by a client are accepted or rejected?


Options are :

  • Compliance: Enforcer Authentication
  • Compliance: Audit logs
  • RADIUS Enforcer System logs
  • Compliance: Enforcer Client (Correct)

Answer : Compliance: Enforcer Client

Which method can be used to upgrade a Symantec Endpoint Protection Manager to include Symantec Network Access Control functionality?


Options are :

  • Perform a MSI push.
  • Use add/remove programs.
  • Run the SNAC.exe.
  • Run the Upgrade wizard. (Correct)

Answer : Run the Upgrade wizard.

After the Symantec Endpoint Protection Manager is installed, what is the correct sequence of steps for implementing the On-Demand client?


Options are :

  • Install Gateway Enforcer and then configure On-Demand (Correct)
  • Install DHCP Integrated Enforcer and then configure On-Demand
  • Configure On-Demand and then install Gateway Enforcer
  • Configure On-Demand and then install DHCP Integrated Enforcer

Answer : Install Gateway Enforcer and then configure On-Demand

A security manager asks if a Host Integrity custom requirement can be configured to ensure a current version of a client firewall is operating and properly blocking traffic. Which custom firewall checks can be offered to the security manager?


Options are :

  • installed, running (Correct)
  • blocking, running
  • installed, processing
  • processing, blocking

Answer : installed, running

Which two components are included in the disaster recovery file? (Select two.)


Options are :

  • certificate files (Correct)
  • database
  • sylink.xml
  • config.properties
  • encryption password (Correct)

Answer : certificate files encryption password

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions