ST0-135 Symantec Network Access Controls Technical Exam Set 6

With the implementation of the method requires the least effort to implement, can limit network traffic and, if desired, have the least impact on the customer's network?


Options are :

  • Self Enforcement
  • Integrated Microsoft DHCP Enforcement
  • Gateway Implementation
  • LAN Implementation
  • None

Answer : Self Enforcement

ST0-91W Symantec NetBackup 7.0 for Windows Practice Exam Set 2

Implementation of the two modes can be configured to Symantec's 6100 device? (Choose two.)


Options are :

  • DHCP Enforcer
  • Integrated DHCP Enforcer
  • Self Enforcement
  • Gateway Enforcer
  • LAN Enforcer

Answer : Gateway Enforcer LAN Enforcer

Which Symantec product may be a Symantec Network Access Control features are in use?


Options are :

  • None
  • Symantec Client Security 3.0
  • Symantec Endpoint Protection 12.1
  • Symantec AntiVirus 10.2
  • Symantec Critical System Protection 5.2

Answer : Symantec Endpoint Protection 12.1

When you get into the network, how the functionality of the On-Demand client showed?


Options are :

  • See if the correct IP address is assigned.
  • Assue ipconfig / renew.
  • None
  • Try to ping the Symantec Endpoint Protection Manager.
  • Attempts to view a web page.

Answer : Attempts to view a web page.

The computer, which is taken from outside the organization's network does not reach the network capacity. Endpoint Protection Client indicates that the machine Honesty has failed and is quarantined. What is the most likely cause of the failure?


Options are :

  • None
  • The customer can verify the enforcer unit.
  • The client can automatically rehabilitation because rehabilitation resources are inaccessible externally not.
  • The firewall policy is not available on the workstation because the endpoint is unable to load the policy.
  • Applying Host Integrity policy positions is not supported.

Answer : The client can automatically rehabilitation because rehabilitation resources are inaccessible externally not.

What is intended to enable the "Admin-defined refurbishing Delay" setting?


Options are :

  • It only allows the administrator to delay Remediations logging in and out of compliance systems.
  • It defines the time after the delay checking whether the remediation was successful.
  • It allows a local user to the endpoint of delaying the restoration of Host Integrity violation.
  • None
  • It requires that the repair is delayed until the situation caused a Host Integrity violation can be resolved.

Answer : It allows a local user to the endpoint of delaying the restoration of Host Integrity violation.

What type of policy does Symantec Network Access Control client uses?


Options are :

  • application management
  • None
  • Intrusion Prevention
  • Host Integrity
  • Virus and Spyware

Answer : Host Integrity

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 10

Security Manager asks for a customized requirement Host Integrity can be configured to ensure the latest version of the client firewall is working correctly and block traffic. Every custom firewall checks can provide a security manager?


Options are :

  • installed, running
  • handling, theft
  • installed, the processing
  • None
  • blocking, running

Answer : installed, running

What happens to an 802.1x environment, which is dependent on Active Directory if the Active Directory server is offline?


Options are :

  • User identification is not available.
  • Host Integrity results are ignored.
  • User authentication is passed.
  • None
  • Everyone gets through the LAN Enforcer.

Answer : User identification is not available.

What is a valid Deployment Methodology to update the version of Symantec Network Access Control client?


Options are :

  • None
  • Run the client patch Symantec Endpoint Protection Manager, and it is distributed automatically to all customers.
  • Use the automatic update to upgrade through client groups Symantec Endpoint Protection Manager a new client package.
  • Apply the update Enforcer and apply the update to each client when it is called into question.
  • Bring an updated client Symantec Endpoint Protection Manager client package and all clients automatically updated.

Answer : Use the automatic update to upgrade through client groups Symantec Endpoint Protection Manager a new client package.

When testing the 802.1x implementation of LAN environments where the administrator can confirm whether the user information provided by the client is accepted or rejected?


Options are :

  • Compliance: Enforcer Client
  • Compliance: Enforcer Authentication
  • None
  • RADIUS Enforcer system logs
  • Compliance: Audit Logs

Answer : Compliance: Enforcer Client

Uncontrolled away the end point is permitted on the output VLAN 802.1x enabled switch port and the guest VLAN is defined. Away endpoint is sent to the guest VLAN. What is the reason for this happening?


Options are :

  • The switch operating table is set incorrectly.
  • Wireless auto configuration service client has stopped.
  • The switch did not receive the endpoint user authentication.
  • None
  • The switch is incompatible with the Symantec Endpoint Protection client.

Answer : The switch operating table is set incorrectly.

What happens when Symantec Endpoint Protection Manager has been updated to include Symantic Network Access Control functions?


Options are :

  • Network Access Control is explicitly ask for in Director
  • Host integrity policy has been introduced in the policy library.
  • None
  • Guest without Host integrity policies to get dropped into quarantine.
  • Symantec Network Access Control Client is enabled for all customers.

Answer : Host integrity policy has been introduced in the policy library.

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 6

The system administrator is to configure the LAN control and is not sure if the switch is connected to the Enforcer. The administrator must be seen traffic in real-time. Every command should the administrator use?


Options are :

  • tcpdump -i eth0 -W
  • Snoop -i -d -v
  • show the core to live
  • None
  • capture all verbose initial filter

Answer : capture all verbose initial filter

The organization administrator defines the LAN Enforcer to work with two HubNet SX1337 layer switch, which uses the 802.1x. When attempting to choose the switch models, the administrator says HubNet is unlisted, and then selects "other". After you set up the rest of the properties, the administrator finds that the Enforcer will send in a dynamic VLAN assignments correct IP address; However, the switch does not change the VLAN. Which required the setting "Other" switch model selection is not an administrator to forget?


Options are :

  • changing V-LAN quarantine
  • Send customized RADIUS attributes Enforcer
  • Send customized RADIUS attributes to switch
  • None
  • changing V-LAN-production

Answer : Send customized RADIUS attributes to switch

Every Symantec Network Access Control technology can prevent the device connects to the network and receives an IP address?


Options are :

  • integrated Enforcer
  • Self Enforcement
  • LAN Enforcer
  • None
  • DHCP Enforcer

Answer : LAN Enforcer

Host Integrity policies are created Policies page of Symantec Endpoint Protection Manager to confirm the patch level of the final results. The purpose is to limit the use of network resources for remediation only when the end point is not Host Integrity rule. The administrator assigned to the appropriate policy of customers and made sure it is enabled. What additional configuration steps are required to meet the desired result?


Options are :

  • Quarantine Specify the location by specifying a restrictive firewall policy
  • Configure the network lock enabling the quarantine option.
  • Configure your firewall practices by enabling the quarantine option
  • None
  • Configure the Network Lock settings for naming a restrictive firewall policies.

Answer : Quarantine Specify the location by specifying a restrictive firewall policy

250-352 Administration of Storage Foundation Practice Exam Set 8

With the implementation of the method requires the Symantec Endpoint Protection Client is to install a firewall enabled?


Options are :

  • LAN Implementation
  • Implementation of DHCP
  • Gateway Implementation
  • self implementing
  • None

Answer : self implementing

It is assumed, which are necessary for the connection settings for connection to a serial Enforcer appliance?


Options are :

  • None
  • Data bits: 8; Parity: none; Stop bits: 1
  • Data bits: 8; Parity: odd; Stop bits: 1
  • Data bits: 8; Parity: odd; Stop Bits: 2
  • Data bits: 8; Parity: even; Stop bits: 1

Answer : Data bits: 8; Parity: none; Stop bits: 1

Which two commands must be registered Enforcer Symantec Endpoint Protection Manager? (Choose two.)


Options are :

  • configure spm {[ip
    ] | [Group ] | [Http ] | [Key ]}
  • configure spm {[ip
    ] | [Domain ] | [Http ] | [Key ]}
  • configure spm {[ip
    ] | [Client_group ] | [Http ] | [Key ]}
  • configure spm {[ip
    ] | [Subnet Mask ] | [Http ] | [Key ]}
  • configure spm {[ip
    ] | [Http ] | [Key

Answer : configure spm {[ip

] | [Group ] | [Http ] | [Key ]} configure spm {[ip
] | [Http ] | [Key
Virus outbreak takes place in the organization's network, where the registry setting is changed to prevent the control panel opening. Which two Symantec Network Access Control for custom options can be used for the organization's administrator for the rehabilitation condition caused by a virus? (Choose two.)


Options are :

  • Create a custom Host Integrity script that will remove the virus executable.
  • Create a custom Host Integrity policy that kills the control panel process.
  • Create a custom firewall rule to prevent access to the registry of the virus
  • Create a custom firewall rule to prevent remote registry access.
  • Create a custom Host Integrity requirement that the restored registry setting.

Answer : Create a custom Host Integrity script that will remove the virus executable. Create a custom Host Integrity requirement that the restored registry setting.

When the customer does not Host Integrity check, it can be limited only by the resources necessary to become compliant. The Integrated Enforcer, where these resources are added?


Options are :

  • Centralized Exceptions Policy
  • Symantec Central Quarantine Server
  • Automatic Quarantine configuration
  • None
  • Symantec Endpoint Protection Manager list

Answer : Automatic Quarantine configuration

Whose report is run the system administrator to learn why the client failed Host Integrity check?


Options are :

  • None
  • Failure to comply with condition
  • Improper clients Location
  • Customers neglect Summary
  • Non-compliance Information

Answer : Non-compliance Information

ST0-135 Symantec Network Access Technical Assesment Exam Set 1

The organization has installed a LAN Enforcer. Remediation resources are the production VLAN. Each method provides resources for remediation VLAN quarantine imposed on customers?


Options are :

  • Specifies static routes Enforcer command line interface remediation server
  • Set up static routes to Host Integrity policy to quarantine VLAN.
  • None
  • Specifies static routes rehabilitation Enforcer group on the server.
  • Specifies static routes the router remediation server (s).

Answer : Specifies static routes the router remediation server (s).

In addition, the Host Integrity policy that the policy has a duty to control access to using the Self-control method of the network?


Options are :

  • Application control policy
  • Centralized Exception policy
  • None
  • firewall policy
  • Device management policy

Answer : firewall policy

A laptop computer is connected to the Internet in connection with non-business. Symantec Network Access Control client is the "Remote" to define the place of the administrator. The customer does not have access to the resources of corporate network. Symantec Network Access Control client reports that the plane Integrity is damaged out-of-date virus definitions third-party antivirus. You may not use the company's remediation servers rehabilitation of issue of this definition. How Symantec Network Access Control administrator of the situation in the future?


Options are :

  • Apply Host Integrity policy in the quarantine camp location.
  • Spread the regional location of the Host Integrity policy to provide alternative options to return the third-party virus definitions.
  • Spread the regional LiveUpdate policy to quarantine location to offer an alternate recovery options LiveUpdate definitions.
  • None
  • Spread a third of virus definitions when Host Integrity fails.

Answer : Spread the regional location of the Host Integrity policy to provide alternative options to return the third-party virus definitions.

Every Enforcer command line interface commands must be entered before the send command can be used?


Options are :

  • spm
  • None
  • log
  • debug
  • specify

Answer : debug

Two functions Symantec Network Access Control Host Integrity check and automate reduces Help Desk calls for IT support? (Choose two.)


Options are :

  • ensuring the necessary software, such as Altiris are running
  • Question Insight reputation of the new File Download
  • detecting and preventing execution key loggers
  • encrypt wireless communications with local administrative users
  • start the services that are stopped users

Answer : ensuring the necessary software, such as Altiris are running start the services that are stopped users

The system administrator configured On-Demand access and notes that customers are displayed by default Group, Symantec Endpoint Protection Manager. What is likely to cause this to happen?


Options are :

  • On-Demand group to be created.
  • On-Demand client failed Host Integrity.
  • None
  • Endpoint lost connection to the Gateway Enforcer.
  • The database is corrupt.

Answer : On-Demand group to be created.

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 1

When the compliance log event indicates a failure to check the signature file, which is not a pre-requirement associated with this event?


Options are :

  • None
  • file condition
  • firewall condition
  • the registry condition
  • virus and spyware condition

Answer : virus and spyware condition

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions