ST0-135 Symantec Network Access Controls Technical Exam Set 5

during a disaster recovery after a re-installation of the Symantec Endpoint Protection Manager, which is the next step in the manual?


Options are :

  • Restore the certificates.
  • To restore the database.
  • None
  • Return the server.xml file.
  • Restore JKS keystore

Answer : To restore the database.

How to get to allowed reconditioning services when the client does not host State Integrity check using the Gateway Enforcer?


Options are :

  • Add the customer table Permitted Client Enforcer.
  • Add a client's MAC address MAC address of the bypass table.
  • Add IP addresses to hosts on the Trusted Internal IP Address List.
  • More client IP address of trusted external IP Address List.
  • None

Answer : Add IP addresses to hosts on the Trusted Internal IP Address List.

The system administrator has changed the Symantec Endpoint Protection Manager includes Symantec Network Access Control. How does an administrator for checking compliance with existing Symantec Endpoint Protection customers?


Options are :

  • Create reviewed compliance with the policy on a per seat basis.
  • Create a quality assurance amendment and add a 'region-specific Setting'.
  • Edit Client Install Setting incorporate quality assurance review of
  • Modify the client's feature set to include a check.
  • None

Answer : Create reviewed compliance with the policy on a per seat basis.

250-371 Administration Symantec NetBackup 7.5 Windows Exam Set 9

What is characteristic of Symantec Network Access Control Integrated Enforcer Integrated Enforcers?


Options are :

  • It is installed on the device.
  • It requires a DHCP Proxy.
  • None
  • It provides the implementation of 802.1x.
  • It is only available in plug-in.

Answer : It is only available in plug-in.

With the implementation of the technology is the ability to install Demand client?


Options are :

  • Gateway Enforcer
  • None
  • Integrated Enforcer for Microsoft DHCP server
  • Integrated Enforcer for Microsoft Network Access Protection
  • LAN Enforcer

Answer : Gateway Enforcer

LAN Enforcer, which mab command displays the current status?


Options are :

  • mab live
  • mAbs allow
  • None
  • mab Show
  • mab status

Answer : mab Show

Once again illustrate the Enforcer via a serial connection, which step is to be carried out first?


Options are :

  • Specify a valid IP address Enforcer.
  • Enable console redirection device BIOS.
  • None
  • Set up a remote terminal of the type VT-UTF8.
  • Enable remote Telnet terminal.

Answer : Enable console redirection device BIOS.

ST0-135 Symantec Network Access Technical Assesment Exam Set 4

The employee has a laptop issued by the employer Symantec Endpoint Protection client installed. Symantec Network Access Control is enabled laptop. Employees can connect to the remote network through the VPN to the corporate network connection. Customers connect through the Gateway Enforcer access the corporate network. What happens first when the worker connectivity to the corporate network from home even though the VPN tunnel?


Options are :

  • The client computer provides compliance information directly from the Symantec Endpoint Protection Manager.
  • On-Demand client is charged.
  • LiveUpdate is done to update the Host Integrity templates.
  • None
  • The client computer provides information on compliance with the Gateway Enforcer.

Answer : The client computer provides information on compliance with the Gateway Enforcer.

What is the most likely cause of the Gateway Enforcer log entry indicates that the endpoint is 'Rejected'?


Options are :

  • Host Integrity failed but was told to go
  • Port 39999 is stalled endpoint.
  • Port 69999 is stalled endpoint.
  • Host Integrity failed endpoint.
  • None

Answer : Port 39999 is stalled endpoint.

Except for the LAN Enforcer are two components required for transparent mode? (Choose two.)


Options are :

  • 802.1x capable of coupling
  • ACLs and firewall enabled Enforcer
  • VPN remote access device
  • RADIUS upstream LAN Enforcer
  • Symantec Endpoint Protection Manager

Answer : 802.1x capable of coupling Symantec Endpoint Protection Manager

Where Symantec Network Access Control client packages can be found in the Symantec Endpoint Protection Manager?


Options are :

  • Admin> mounting kits
  • Client> Policies
  • Customers> mounting kits
  • Policies> Policy Components
  • None

Answer : Admin> mounting kits

Every host Integrity model practices involved in Symantec Network Access Control?


Options are :

  • to control the password complexity, WSUS waiting time packages are installed, quit the application in a particular fingerprint
  • Host Integrity check every X minutes, so that the user can cancel the remediation requirements continue to check after the fail
  • the requirement antivirus, firewall requirement Service Pack requirement
  • None
  • download a file, the registry: Set an example of a registry file, Registry: Increment registry DWORD

Answer : to control the password complexity, WSUS waiting time packages are installed, quit the application in a particular fingerprint

How to devices such as printers and IP phones, leaving support for the Symantec Network Access Control Integrated Enforcer?


Options are :

  • Configure MAC Authentication Bypass Symantec Endpoint Protection Manager.
  • Configure a trusted vendor list Symantec Endpoint Protection Manager.
  • Specify the MAC authentication bypass is Symantec Network Access Control Integrated Enforcer.
  • Configure a trusted host list Symantec Endpoint Protection Manager.
  • None

Answer : Configure a trusted host list Symantec Endpoint Protection Manager.

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 4

Two components are included in the disaster recovery file? (Choose two.)


Options are :

  • config.properties
  • decryption password
  • sylink.xml
  • database
  • certificate files

Answer : decryption password certificate files

Two methods are recommended Symantec backup of the embedded database? (Choose two.)


Options are :

  • Copy the contents of [drive]: Program Files Symantec Endpoint Protection Manager data folder.
  • Perform database backup and restore Wizard found in the Symantec Endpoint Protection Manager Program Group.
  • Perform a backup Symantec Endpoint Protection Manager Console home page.
  • Select the backup from Symantec Endpoint Protection Manager Console management page.
  • Use Symantec's authorized third-party backup tools to backup the database instance.

Answer : Perform database backup and restore Wizard found in the Symantec Endpoint Protection Manager Program Group. Select the backup from Symantec Endpoint Protection Manager Console management page.

When installing Symantec Network Access Control external database, which is installed Symantec Endpoint Protection Manager before you install the manager software?


Options are :

  • Apache Web Server
  • None
  • Microsoft IIS
  • Microsoft SQL Client Tools
  • Apache Tomcat

Answer : Microsoft SQL Client Tools

Every technique is included in Symantec Network Access Control agent?


Options are :

  • compliance with the host
  • antivirus
  • party wall
  • None
  • Intrusion Prevention

Answer : compliance with the host

What method can be upgraded to Symantec Endpoint Protection Manager includes Symantec Network Access Control functions?


Options are :

  • None
  • Run SNAC.exe.
  • Run the Upgrade Wizard.
  • Use the Add / Remove Programs.
  • Run the MSI push.

Answer : Run the Upgrade Wizard.

After the Symantec Endpoint Protection Manager is installed, which is the correct steps to implement On-Demand client?


Options are :

  • Specify the On-Demand and reinstall Gateway Enforcer
  • Install the DHCP Integrated Enforcer, and define the On-Demand
  • None
  • Specify the On-Demand and install the DHCP Integrated Enforcer
  • Gateway Enforcer to install and configure the On-Demand

Answer : Gateway Enforcer to install and configure the On-Demand

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 1

What are the two features of Symantec Network Access Control client? (Choose two.)


Options are :

  • provide the Network Threat Protection
  • give SONAR protection
  • run custom programs
  • virus scan
  • Check third-party security software

Answer : run custom programs Check third-party security software

The organization, which is the use of Symantec's products have been used for network access control, antivirus and antispyware, proactive threat protection, and network threat protection software. Which Symantec client (s) must be installed on the organization's workstations?


Options are :

  • Symantec Endpoint Protection and Symantec On-Demand clients
  • None
  • Symantec Endpoint Protection client
  • Symantec Network Access Control and Symantec Endpoint Protection clients
  • Symantec Network Access Control client

Answer : Symantec Endpoint Protection client

What are the two primary purpose of Symantec Network Access Control? (Choose two.)


Options are :

  • check the endpoint computers, Host Integrity Acting in accordance with the amount of time
  • update policies Symantec Endpoint Protection Manager
  • to prevent out-of-compliance systems affect production resources
  • install new operating systems on client workstations
  • put non-compliant end points of a captive portal

Answer : check the endpoint computers, Host Integrity Acting in accordance with the amount of time to prevent out-of-compliance systems affect production resources

What can trigger Symantec Endpoint Protection client to change places?


Options are :

  • Customer access Group Policy settings are changed.
  • The customer receives a new host Integrity policy.
  • Customer's web address will change.
  • Client restarts
  • None

Answer : Customer's web address will change.

Which is the number of the port number must match the definition of the Enforcer so that it communicates with the Symantec Endpoint Protection Manager?


Options are :

  • server port number
  • Customer Communications Port Number
  • None
  • The server control port number
  • Web Services Port Number

Answer : Customer Communications Port Number

Two of which are requirements for checking the guest Host Integrity endpoint compliance and access to the Internet allows only VLAN that is not a Gateway Enforcer line? (Choose two.)


Options are :

  • Gateway Enforcer is a guest VLAN
  • Gateway Enforcer Web authentication is configured
  • Symantec On-Demand client EAP authentication
  • Symantec On-Demand client without EAP authentication
  • Symantec Integrated Enforcer

Answer : Gateway Enforcer is a guest VLAN Symantec On-Demand client EAP authentication

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 9

From the log can be determined by the administrator that the Enforcer has been successfully registered with the Symantec Endpoint Protection Manager?


Options are :

  • Compliance: Enforcer Server
  • None
  • System Logs: Enforcer Action
  • System Logs: Enforcer Client
  • Compliance: Enforcer Traffic

Answer : Compliance: Enforcer Server

How many extra packages will be available on the client when the Symantec Endpoint Protection Manager has been updated Symantec Network Access Control?


Options are :

  • 2
  • 1
  • 0
  • 3
  • None

Answer : 2

What can be used to check Host Integrity Policy Symantec products leave the built-in checks?


Options are :

  • custom requirements
  • a pre-defined requirements
  • customizable requirements
  • None
  • pre-defined checks

Answer : custom requirements

What is the recommended first step in Symantec to upgrade the Symantec Endpoint Protection Manager the next release?


Options are :

  • Enable Local Authentication.
  • The backup database.
  • Turn off replication.
  • None
  • Stop the Symantec Endpoint Protection Manager service.

Answer : The backup database.

Symantec Network Access Control can be implemented as a separate module or integrated with the Symantec Endpoint Protection. What is the only policy that exists in both stand-alone and integrated implementations


Options are :

  • Host Integrity
  • None
  • party wall
  • centralized Exceptions
  • Live update

Answer : Live update

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions