ST0-085 Symantec Security Information Manage Technical Exam Set 2

Each third-party software components, LDAP users, roles and configuration support?


Options are :

  • IBM Directory Server 7.0
  • IBM DB2 8.1
  • IBM Directory Server 6.0
  • IBM DB2 8.2
  • None

Answer :IBM Directory Server 6.0

Which RAID level is recommended for DAS configuration?


Options are :

  • RAID 10
  • RAID 7
  • RAID 1
  • RAID 5
  • None

Answer :RAID 5

ST0-91W Symantec NetBackup 7.0 for Windows Practice Exam Set 5

What is a hard disk drive 9650 specifications?


Options are :

  • 6-position (two mirrored RAID 4 and 5)
  • None
  • 6 drives (RAID 5)
  • Two drives (mirror)
  • 6-position (two mirrored RAID 4 and 10)

Answer :6-position (two mirrored RAID 4 and 5)

Which has a database of accidents and summary data?


Options are :

  • MySQL's
  • MSSQL
  • None
  • IBM DB2
  • oracle

Answer :IBM DB2

This one is about to reinstall the Symantec Security Information Manager appliance Really?


Options are :

  • Before installation, all data is stored DeepSight global database in the database.
  • None
  • During the installation, repair software option must be selected to keep the information on the device.
  • Reinstall all data on the device software for erasing.
  • The database has been turned off, so reinstall the software will Nonet have any effect.

Answer :Reinstall all data on the device software for erasing.

ST0-135 Symantec Network Access Control 12 Technical Exam Set 3

How Symantec Security Information Manager provides the ability to archive data tables custom event it is the user?


Options are :

  • Add, delete and modify pre-existing column
  • Add, delete and rename predefined columns
  • Add, delete, and reorder the columns in advance
  • None
  • Add, remove, and rearrange predetermined line

Answer :Add, delete, and reorder the columns in advance

After all the rules are properly defined, the correlation engine can analyze _____ events.


Options are :

  • None
  • Standard rules, create conclusions, and sent its conclusions database
  • False positives, create conclusions, conclusions and associated events
  • Standard rules, create conclusions, conclusions and associated events
  • Standard rules, create a trigger and conclusions related events

Answer :Standard rules, create conclusions, conclusions and associated events

Symantec Security Information Manager automatically upgraded based on some pre-defined and user-defined _____ security events to the event.


Options are :

  • accident
  • Proceedings
  • Bunting
  • rule

Answer :rule

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 9

Which you choose a menu option in the user interface, shut down or restart the Symantec Security Information Manager (SSIM) equipment?


Options are :

  • System -> Shutdown / Reboot
  • None
  • SSIM -> Device Configuration -> Shut Down / Restart
  • SSIM console -> System Tab
  • SSIM console -> Shut Down / Restart

Answer :SSIM -> Device Configuration -> Shut Down / Restart

Symantec Security Information Manager provides centralized management of ____ family dynamic association and large distributed enterprise systems.


Options are :

  • 9,630.00
  • 9,850.00
  • 9,600.00
  • 9,650.00

Answer :9,650.00

Each tag information management console allows you to view information about threats and vulnerabilities?


Options are :

  • rule
  • report
  • None
  • intellegence
  • Dashboard

Answer :intellegence

ST0-247 Symantec Cluster Server 6.1 for UNIX Certifate Exam Set 1

What is the purpose of the key functions of asset management business is?


Options are :

  • It gets an overview of the enterprise.
  • It can affect the security threats critical business applications of automatic identification and prioritization
  • None
  • This makes it possible to change the collector configured to meet the needs of the business assets.
  • It provides, among ciritical company's resources are located in a visual image.

Answer :It can affect the security threats critical business applications of automatic identification and prioritization

Once the data has been archived, deleted from the Symantec Security Information Management system, you can use the data?


Options are :

  • None
  • Stories Archive Viewer
  • Archive log
  • Related Event Viewer
  • Events Archive Viewer

Answer :Events Archive Viewer

What security (SSL) protocol to use?


Options are :

  • None
  • Transport Layer Security based data transmission session, trusted certificate
  • Transport layer protection, and a proxy device based on the communication session;
  • Transport layer protection, based on the data transmission session, trusted certificate
  • The SFTP, based on the communication, and trusted certificates session

Answer :Transport layer protection, based on the data transmission session, trusted certificate

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 8

How to organize an integrated global security intelligence connected to receive updates?


Options are :

  • DeepSight security features through licensing
  • With this feature enabled console
  • Use the default settings console
  • By authorizing the use of integrated global security intelligence products
  • None

Answer :DeepSight security features through licensing

What are the specific minimum requirements for hardware installation and deployment of Symantec Security Information Manager console is?


Options are :

  • 512 MB RAM and 103 MB of disk space
  • 1 GB of hard disk space and 1 GB of RAM
  • GB 1 RAM memory and 512 MB of disk space
  • None
  • 512 MB of RAM and 1 GB of disk space

Answer :512 MB RAM and 103 MB of disk space

JRE per common version of the installed product?


Options are :

  • $2
  • $2
  • 1.4.2
  • 1.5.0
  • None

Answer :1.5.0

250-400 Administration Altiris Client Management Suite Exam Set 4

It is through the media device software?


Options are :

  • CD
  • DVD
  • The software is pre-installed.
  • None
  • software download

Answer :DVD

DeepSight How do you install a valid license integration?


Options are :

  • Open the Symantec Security Information Manager console; configure the device; click DeepSight integrated configuration management
  • None
  • Open the Symantec Security Information Manager console; configure the device; click License
  • Device, insert the authorization of / opt / Symantec / license folder
  • Installation License Wizard

Answer :Open the Symantec Security Information Manager console; configure the device; click DeepSight integrated configuration management

Symatec Security Information Management Series _____ also kNonewn collection device.


Options are :

  • 9,530.00
  • None
  • 9,550.00
  • 9,650.00
  • 9,630.00

Answer :9,630.00

ST0-247 Symantec Cluster Server 6.1 for UNIX Certifate Exam Set 8

Which three should be properly assessed in the deployment?


Options are :

  • Desktop anti-virus
  • Desktop Applications
  • Network Intrusion Detection System
  • Perimeter firewall
  • Host operating system

Answer :Desktop anti-virus Network Intrusion Detection System Perimeter firewall

From the Information Manager console allows you to _____ priority critical network equipment reNonevation work at.


Options are :

  • report
  • assets
  • rule
  • None
  • Bunting

Answer :assets

What information is required to deploy the appropriate size?


Options are :

  • Hard disk space, location transactions per second
  • Transactions per second, location and event to event in terms of
  • Hard disk, collected per event type
  • The ratio of transactions per second, collector types of events and events
  • None

Answer :Transactions per second, location and event to event in terms of

ST0-237 Symantec Loss Prevention Technical Assessment Exam Set 6

When the database recovery Symantec Security Information Manager?


Options are :

  • When the database is compromised
  • None
  • When the data reaches the life expectancy
  • When the false-positive results have been confirmed by the database
  • When there is a database failure, can Nonet confirm

Answer :When there is a database failure, can Nonet confirm

What is the difference between (SSIM) on the screen and the machine under the collector Symantec Security Information Manager?


Options are :

  • In the cartridge case collector installation and removal collectors separately installed before installing the software SSIM.
  • Closed box installed on the device and installed assets collectors box collectors.
  • Close cartridge mounting collectors mounted on the apparatus and the cartridge SSIM product collector.
  • None
  • SSIM software is automatically installed in the cartridge and closing the cartridge collector collectors installed separately.

Answer :SSIM software is automatically installed in the cartridge and closing the cartridge collector collectors installed separately.

Symantec Security Information Manager, collectors send events _____.


Options are :

  • Event Recorder
  • Event Report
  • Event handling
  • Events Archive
  • None

Answer :Event Recorder

ST0-10X Veritas Storage Foundation 5 for Unix Practice Exam Set 7

What is the collection box?


Options are :

  • PIX, UNIX system logs and Seagate
  • Checkpoints, SNonert and PIX
  • None
  • PIX, SNonert's, and Symantec Mail Security
  • When the checkpoint, UNIX system logs and Symantec Network Security

Answer :Checkpoints, SNonert and PIX

Each port used for secure LDAP directory?


Options are :

  • Port 636
  • Port 22
  • None
  • Port 389
  • Port 443

Answer :Port 636

You participate in the examination of official Symantec Education? If this is the case, select the type of training you are ready. (Select all eligible.)


Options are :

  • Other
  • Virtual instructor-led classroom
  • Teacher '
  • E-learning / Web-based training
  • Symantec will host the webcast
  • Webcast sponsored distributor or retailer

Answer :Other

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 2

What kind of information before, deploy, and configure the product, Symantec Security Information Manager appliance is required?


Options are :

  • Air conditioning and power requirements
  • None
  • Each device handles a number of security incidents
  • The number of Nonedes can be found in the customer's infrastructure
  • A collector box for installation

Answer :Each device handles a number of security incidents

Symantec Security Information Management Series device to install the operating system by default?


Options are :

  • Windows
  • The Solaris
  • SUSE
  • None
  • Red Hat

Answer :Red Hat

This content Symantec Security Information Manager components from the Symantec application security?


Options are :

  • None
  • Security content search automatically.
  • DeepSight integrated module license
  • Updated in real time, and at the same time permit the integration module DeepSight
  • Live Update

Answer :DeepSight integrated module license

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 2

Symantec Security Information Manager (SSIM) _____ job is to send events to SSIM server component of Symantec products.


Options are :

  • collector
  • agent
  • Closed box collection
  • The collection box
  • None

Answer :agent

What is the integration of equipment?


Options are :

  • Event log and sensor systems
  • None
  • Data analyzing sensor data
  • Packet data, reducing the size of flow database
  • Forwarded to the device's

Answer :Packet data, reducing the size of flow database

How to install Symantec Security Information Manager (SSIM) console?


Options are :

  • None installation is necessary because SSIM is a browser-based tool.
  • Since the introduction of equipment SSIM console machine
  • SSIM to the Web interface, download the client, and then click Run
  • SSIM is the DVD, go to Tools and install the client
  • None

Answer :SSIM to the Web interface, download the client, and then click Run

ST0-237 Symantec Loss Prevention Technical Practice Exam Set 5

Each task is Symantec Security Information Manager performs event management?


Options are :

  • Create a loophole class.
  • The implementation of adjustment attack
  • Specifies the team project a.
  • The report of the event SANS Internet Storm Center.
  • From future attacks and project documentation

Answer :Specifies the team project a.

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 6

Identify which of the two was used to quantify important equipment to help determine how to upgrade the equipment associated with this security event information management of accounts receivable table? (Choose two.)


Options are :

  • critical
  • integrity
  • Confidence
  • priority
  • serious

Answer :integrity Confidence

If the filter rule matches, refuse the transaction from the component?


Options are :

  • agent
  • Related
  • None
  • aggregate
  • collector

Answer :Related

What is wrong with trying to make real-time Symantec Security Information Management?


Options are :

  • Relevance, stirred, filtered, and case management
  • None
  • Correlation, aggregation, filtering, and case creation
  • Correlation, aggregation, analysis of the property sheet, filter, create incidents and accidents
  • Correlation, analysis of the property sheet, the event was created, as well as user input

Answer :Correlation, aggregation, filtering, and case creation

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 4

What is the unique identifier, which allows the Nonermalization of each event?


Options are :

  • Figure signature device-specific event
  • Figure signature device-specific event
  • More specific management, data conversion occurs
  • None
  • More specific management data is converted to event

Answer :More specific management, data conversion occurs

What is the correct Symantec Security Information Manager Event tube recognition?


Options are :

  • Standardization -> Series -> Rules Processing -> Track Attack -> related vulnerability - at> the priority
  • None
  • Rule Processing -> Nonermalize -> Series -> Track Attack -> related vulnerability - at> the priority
  • Tracking Attack -> Rules Processing -> Nonermalization -> Collection -> Vulnerability correlation -> case, priority
  • Collection -> Nonermalize -> Rules Processing -> Track Attack -> related vulnerability - at> the priority

Answer :Collection -> Nonermalize -> Rules Processing -> Track Attack -> related vulnerability - at> the priority

What is the purpose of standardization is what?


Options are :

  • None
  • To compare the management related activities across multiple devices in all events associated with a
  • Standardization across multiple Device Manager event correlation in a comparison of all events
  • To minimize the impact of the relationship between the number of multiple devices events manage events more quickly develop strategies
  • There are multiple strategies related equipment to process transactions more quickly manage events

Answer :Standardization across multiple Device Manager event correlation in a comparison of all events

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 5

So what is the relevant managers to identify network events based on it?


Options are :

  • None
  • Firewall-based mode of attack
  • Penetrate only UNIX operating system worms
  • Namely via SNMP and SMTP traffic virus
  • OS failed login attempts

Answer :Firewall-based mode of attack

When the same question which is the number of what information manager combine to make the case?


Options are :

  • Delete the original event, and create a new event
  • In the event the original report of the SANS Internet Storm Center, will close the event, and create a new event
  • None
  • Turn off the original event, and create a new event
  • Save the original event, and create a new event

Answer :Turn off the original event, and create a new event

When two Nonen-Symantec Security Information Manager automatically generates value, create a new event manually? (Choose two.)


Options are :

  • Event ID number
  • Support Service Request
  • Event Creator
  • Name of the rule
  • Through case

Answer :Name of the rule Through case

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 6

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions