ST0-135 Symantec Network Access Control 12 Technical Exam Set 6

What is always replicated when replicating data between Symantec Network Access Control Managers?


Options are :

  • groups, logs, policies
  • administrators, groups, policies (Correct)
  • content, install packages, logs
  • policies, domains, install packages

Answer : administrators, groups, policies

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 1

Which two are purposes of a location-based Host Integrity policy? (Select two.)


Options are :

  • to apply a new IPS policy to client groups in another location
  • to apply a more stringent Host Integrity policy than another location (Correct)
  • to increase the strength of the anti-virus policy in another location
  • to have a custom script run when connected to a different location (Correct)
  • to switch firewall rules when connected to an external network

Answer : to apply a more stringent Host Integrity policy than another location to have a custom script run when connected to a different location

Which tool is used to access the command line interface over the network?


Options are :

  • Telnet
  • serial
  • SSH (Correct)
  • RDP

Answer : SSH

Which common functions are available in an operating system requirement?


Options are :

  • wait, log a message, disable Symantec Network Access Control
  • specific retry interval, allow user to cancel remediation, set timestamp (Correct)
  • run a script, set a registry value, restart host integrity check
  • download installation package, allow user to cancel remediation, invoke application startup command

Answer : specific retry interval, allow user to cancel remediation, set timestamp

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 6

Which two troubleshooting methods are useful when working with custom requirements in Host Integrity checking? (Select two.)


Options are :

  • Carefully examine the properties of the Symantec Endpoint Protection Manager.
  • Use registry message logging to help debug the execution sequence. (Correct)
  • Enable pass and fail pop-up messages in the Host Integrity Policy Advanced Settings. (Correct)
  • Check the LiveUpdate SRT website for current policy updates.
  • Check the group structure in the Symantec Endpoint Protection Manager for anomalies.

Answer : Use registry message logging to help debug the execution sequence. Enable pass and fail pop-up messages in the Host Integrity Policy Advanced Settings.

Which command does an administrator use to halt On-Demand access after logging into a Gateway Enforcer?


Options are :

  • on-demand stop
  • on-demand terminate
  • on-demand halt
  • on-demand disable (Correct)

Answer : on-demand disable

Which custom requirement conditions can an administrator use to verify the integrity of a given executable?


Options are :

  • file fingerprint equals, compare file date to (Correct)
  • file signature file equals, file exists
  • file MD5 equals, compare file age to
  • file version equals, dll called is

Answer : file fingerprint equals, compare file date to

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 8

The administrator at Lifeline Supply Company wants to use the Symantec Network Access Control Manager to upgrade clients to the latest Maintenance Release. What must be done to distribute the delta install packages to the client?


Options are :

  • deploy the maintenance release with the Migration and Deployment tools
  • export new install packages to deploy with the Altiris Integration Component
  • enable the product update settings in the LiveUpdate Policy
  • add a new Client Install Package with the maintenance release (Correct)

Answer : add a new Client Install Package with the maintenance release

Which two third-party tools can be used to connect remotely to an Enforcer appliance? (Select two.)


Options are :

  • Telnet
  • RPC
  • Wireshark
  • HyperTerminal (Correct)
  • PUTTY (Correct)

Answer : HyperTerminal PUTTY

When upgrading the Enforcer to a new version, what should be selected from the GRUB boot menu?


Options are :

  • Symantec SetUp
  • Setup Symantec Enforcer from CD-ROM (Correct)
  • Reset to Factory Image
  • Boot Symantec Enforcer from Hard Disk

Answer : Setup Symantec Enforcer from CD-ROM

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 3

What is the primary purpose for implementing a client firewall?


Options are :

  • to authenticate sites
  • to block connections (Correct)
  • to detect threats
  • to restrict URLs

Answer : to block connections

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 10

A company has been having difficulty with employees running the peer-to-peer application "Ward-of-Witchcraft" (wow!.exe). This application causes network storm difficulties across the corporate wide area network (WAN). Because this application uses well known ports (80) and protocols (HTTP, SOAP), the perimeter firewall rules alone have been ineffective at preventing the wow!.exe application from bogging down the WAN. What are three practical methods that can help prevent "Ward-of-Witchcraft" (wow!.exe) from causing network storms that disrupt the company enterprise? (Choose three.)


Options are :

  • create a firewall rule blocking the wow!.exe application (Correct)
  • implement Application Control settings to prevent wow!.exe execution (Correct)
  • implement a TruScan Proactive Threat Scan centralized exception to terminate wow!.exe (Correct)
  • create a firewall rule blocking ports used by wow!.exe
  • create a centralized Antivirus scan exception for wow!.exe

Answer : create a firewall rule blocking the wow!.exe application implement Application Control settings to prevent wow!.exe execution implement a TruScan Proactive Threat Scan centralized exception to terminate wow!.exe

You trigger on "Services" in a firewall rule. Which layer of the OSI model does this trigger analyze?


Options are :

  • physical
  • network
  • presentation
  • transport (Correct)

Answer : transport

Lifeline Supply Company deploys a freeware application, EasyWeatherView, that is funded by advertising. It is detected by Symantec Network Access Control as Adware. WeatherBorg because it includes banner advertisements in its client interface. The company accepts the risk and treats EasyWeatherView as an undetected application and bypasses the standard adware policy actions. How can this best be configured in Symantec Network Access Control?


Options are :

  • edit the Exclusion policy to exclude Adware.WeatherBorg from detection by marking the "Exclude" checkbox in the threat list and clearing the "Log Option" checkbox (Correct)
  • edit the Antivirus and Antispyware policy and set both the Primary and Secondary actions for Adware to "Ignore"
  • edit the Application and Device Control policy and clear the EasyWeatherView checkbox in the Security Risk list for exclusions
  • edit the Antivirus and Antispyware policy and set the Primary Action for security risks to "Leave Alone"

Answer : edit the Exclusion policy to exclude Adware.WeatherBorg from detection by marking the "Exclude" checkbox in the threat list and clearing the "Log Option" checkbox

ST0-135 Symantec Network Access Control 12 Technical Exam Set 3

You need to create a firewall rule that allows Internet Explorer to communicate to any website, but only on port 80 or 443. Which two triggers in the firewall rule should be used? (Choose two.)


Options are :

  • Service (Correct)
  • Host
  • Application (Correct)
  • Logging
  • Adapter

Answer : Service Application

Which type of firewall is in Symantec Network Access Control?


Options are :

  • circuit level
  • stateful (Correct)
  • proxy
  • packet filtering

Answer : stateful

Which Auto-Protect types are configurable?


Options are :

  • Application, File System, Internet Email, Lotus Notes
  • File System, Internet Email, Microsoft Outlook, GroupWise
  • File System, Internet Email, Lotus Notes, Microsoft Outlook (Correct)
  • Application, File System, Microsoft Outlook, Sendmail

Answer : File System, Internet Email, Lotus Notes, Microsoft Outlook

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 1

What is a function of the Symantec Network Access Control client firewall?


Options are :

  • blocks DLLs from executing for a given process
  • forces processes to terminate
  • modifies forwarding tables
  • controls which programs can access networks (Correct)

Answer : controls which programs can access networks

A user of the Lifeline Supply Company added a daily 10:00 am scheduled scan to their Symantec Network Access Control Client. After reviewing the logs, the user confirms that the scan failed to start at 10:00 am. What are two possible reasons that the scan failed to start? (Choose two.)


Options are :

  • Auto-Protect was unlocked.
  • Scan Progress options were set to not show progress
  • Delay scheduled scans when running on battery was enabled. (Correct)
  • Auto-Protect was disabled.
  • The user was logged off of the computer. (Correct)

Answer : Delay scheduled scans when running on battery was enabled. The user was logged off of the computer.

Which two types of firewall settings are found in Symantec Network Access Control? (Choose two.)


Options are :

  • stealth (Correct)
  • VPN tunneling
  • address transforms
  • protocol abnormality detection
  • smart traffic filters (Correct)

Answer : stealth smart traffic filters

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 7

The Symantec Network Access Control client creates a file or directory exclusion for all scans when it detects _____.


Options are :

  • SQL Server is installed
  • Microsoft Exchange 2000 is installed (Correct)
  • Microsoft Vista is installed
  • Microsoft Outlook is installed

Answer : Microsoft Exchange 2000 is installed

When Auto-Protect is enabled, protection is optional for which type of file access?


Options are :

  • Write
  • Backup (Correct)
  • Delete
  • Restore

Answer : Backup

To configure an On-demand scan, which policy do you need to configure?


Options are :

  • Host Integrity
  • Antivirus and Antispyware (Correct)
  • Firewall
  • LiveUpdate

Answer : Antivirus and Antispyware

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 1

You receive an email from an associate with a .ZIP file attached. Your associate informs you there are three files in the .ZIP file you need for your presentation tomorrow. What neither you nor your associate realize is one of the files is infected with a virus. When will Auto-Protect detect this infected file?


Options are :

  • when the .ZIP file is opened (Correct)
  • when you open the email from your associate
  • when you close the email from your associate
  • when the .ZIP file is saved to your desktop

Answer : when the .ZIP file is opened

For which two items can users create exceptions? (Choose two.)


Options are :

  • TruScan Proactive Threat Scan (Correct)
  • Tamper Protection
  • Client Firewall
  • Security Risks (Correct)

Answer : TruScan Proactive Threat Scan Security Risks

A user with local administrative privileges received a pop-up notification from the Symantec Network Access Control client each time the user ran a specific program. The pop-up indicated that it detected a potentially harmful process and had stopped it. The user created an exception so it will no longer be detected. The administrator wants to stop the user from doing this. What should the administrator do?


Options are :

  • create a file fingerprint for the program
  • enable Tamper Protection
  • clear the Allow the user to stop a scan checkbox
  • restrict Security Risk exceptions (Correct)

Answer : restrict Security Risk exceptions

ST0-135 Symantec Network Access Control 12.1 Technical Asses Set 3

When must a Symantec Network Access Control client reboot during or after installation in order to be fully functional? (Choose three.)


Options are :

  • when only Network Threat Protection has been installed on the client (Correct)
  • when only Antivirus and Antispyware have been installed on the client
  • when MSI 3.0 is installed on the client (Correct)
  • when all features of Symantec Network Access Control have been installed on the client (Correct)
  • when Antivirus, Antispyware, and Proactive Threat Protection have been installed on the client

Answer : when only Network Threat Protection has been installed on the client when MSI 3.0 is installed on the client when all features of Symantec Network Access Control have been installed on the client

You receive a .ZIP file on your work laptop at home. The file was scanned by the Symantec Network Access Control client and showed the file uninfected. You come into the office and open the same file on your work computer. You now receive the error, "VIRUS DETECTED AND QUARANTINED." Your troubleshooting methodology has stumped your negative connotations. What is the most accurate cause for the discovered virus?


Options are :

  • TruScan Proactive Threat Scan was disabled on your home computer.
  • The home profile had an Antivirus risk action defined to quarantine only
  • A signature on your work computer is improperly identifying a .ZIP as a virus
  • Compressed file scanning 3 or more levels deep is incorrectly configured. (Correct)

Answer : Compressed file scanning 3 or more levels deep is incorrectly configured.

What are three valid configurable actions for a Symantec Network Access Control Antivirus and Antispyware policy when a worm, virus, or Trojan is detected? (Choose three.)


Options are :

  • quarantine the infected file (Correct)
  • generate an SNMP trap
  • pause outbound network traffic
  • clean the infected file (Correct)
  • block the source IP address
  • delete the infected file (Correct)

Answer : quarantine the infected file clean the infected file delete the infected file

250-271 Administration Symantec Net Backup 7.5 for Unix Exam Set 2

What can Symantec Network Access Control do when Auto-Protect detects an Internetbased threat?


Options are :

  • set the default home page (Correct)
  • disable browser helper objects
  • prevent pop-ups from being displayed
  • block cookies from writing to the disk

Answer : set the default home page

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions