ST0-135 Symantec Network Access Technical Assesment Exam Set 3

The organization requires Symantec Network Access Control solutions to ensure the end authorized to access the organization's production network, Host Integrity policies compatible. In addition, the LAN Enforcer, the two products must meet the requirements? (Choose two.)


Options are :

  • 802.1x capable of coupling
  • Symantec Endpoint Protection Manager
  • Remote Access Device
  • ACL and firewall enable enforcement
  • Central Quarantine Server

Answer : 802.1x capable of coupling Symantec Endpoint Protection Manager

The organization shall customers by using Host Integrity policy enforcement stored in the script. What is an administrator for the execution of the script variables?


Options are :

  • None
  • %script%
  • Name $ NameOfScript and NameOfScript = script
  • $ PathToScript position and PathToScript = script
  • % N%

Answer : % N%

Lifeline supply company began a phased migration process Symantec AntiVirus Corporate Edition (SAVCE) 10.1 Symantec Network Access Control. During the transfer, the system administrator to create a Symantec Network Access Control Manager (SEPM) report who has been transferred to the reporting and collection of data SAVCE 10.1 customer's customer. Two steps must be completed to gather report data? (Choose two.)


Options are :

  • SEPM Symantec System Center provides the IP address or DNS name
  • SAVCE mobile reporting database Migration and Deployment Wizard
  • provide the IP addresses or DNS names of the reporting servers to the SEPM
  • SAVCE move the Migration and Deployment Wizard report server
  • Configured to receive SEPM Symantec Antivirus 10.x log files
  • Configuring the Symantec System Center was established according to the report server reports

Answer : Configured to receive SEPM Symantec Antivirus 10.x log files Configuring the Symantec System Center was established according to the report server reports

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 12

It features a custom design requirements?


Options are :

  • It is added to the labeling requirements Host Integrity policy.
  • None
  • It will be added Host Integrity Policy additional settings tab.
  • It has been shown to guests Labeling Organizations International Group.
  • It has been introduced the Features tab of the Policy Manager.

Answer : It is added to the labeling requirements Host Integrity policy.

Copy the data to Symantec Network Access Control manager always repeat what time?


Options are :

  • Group, logs, strategy
  • Administrator, group policy
  • Content, install the package log
  • Policy, the domain name, the installation package
  • None

Answer : Administrator, group policy

Using this system, which is self-tightening supervision Host Integrity Policy "quarantine failure for the host immune List" is located in Symantec Endpoint Protection Manager option?


Options are :

  • Protection against viruses and spyware> Quarantine> Advanced Settings
  • None
  • Customer page> Policies tab> position and practice settings> Isolated
  • Customer page> Customers tab> Quarantine> location settings and Practice
  • Protection against viruses and spyware protection> Advanced Settings> isolation

Answer : Customer page> Policies tab> position and practice settings> Isolated

ST0-91W Symantec NetBackup 7.0 for Windows Practice Exam Set 4

How many different implementations can be configured to enforce 6100?


Options are :

  • 3
  • 1
  • 2
  • 4
  • None

Answer : 2

Which tool to use the command line on the network use?


Options are :

  • series
  • SSH
  • None
  • RDP
  • Remote Login

Answer : SSH

What is the appropriate step of introducing the model Host Integrity requirements?


Options are :

  • None
  • Configuration Policies> Configuration Options> Use Policy
  • Import protection> Configuration Policy> Policy Template
  • Creating Policies> Configure Policy> Policy Template
  • Download Protection> Configure Policy> Policy Template

Answer : Import protection> Configuration Policy> Policy Template

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 6

Lifeline supply company hired 900 people to their position. Data center Microsoft Exchange 2007 and Oracle databases. Various versions of Symantec AntiVirus Corporate Edition they are currently running is managed by the Symantec System Center. They plan to migrate to Symantec Network Access Control, and IT managers must consider the cost-effectiveness of budgetary constraints shares. What web design best meets the company's cost efficiency requirements?


Options are :

  • Design a single paragraph of aggregation Microsoft SQL database and multiple Symantec Network Access Control Manager
  • A site layout with an embedded database and a number of Symantec Network Access Control Manager
  • The layout of a site manager in a Microsoft SQL database and multiple Symantec Network Access Control of
  • None
  • A site layout with an embedded database and one of the Symantec Network Access Control Manager

Answer : A site layout with an embedded database and one of the Symantec Network Access Control Manager

The two third-party tools can be used to access remote devices to the Enforcer? (Choose two.)


Options are :

  • The Wireshark
  • putty
  • Remote Login
  • RPC
  • HyperTerminal

Answer : putty HyperTerminal

The organization's security policy requirements only when the laptop to connect to the production network host integrity check. Its mandate should meet the safety requirements?


Options are :

  • Communication setting heartbeat interval placed into the desired client Group Policy Settings
  • The time interval required for the location of the telecommunications regulatory heartbeat settings.
  • None
  • Set Integrity Host Requirements "whenever the host is connected to the management server when the integrity check."
  • Set Host Integrity policy requirements, "just to get the Host Integrity Gateway or DHCP Enforcer".

Answer : Set Integrity Host Requirements "whenever the host is connected to the management server when the integrity check."

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 11

What is the first step to troubleshoot custom Host Integrity policy requirements?


Options are :

  • Running a Host Integrity check out similar systems
  • None
  • Check the performance of the client endpoint.
  • For inspection of the logical structure.
  • Summary check security compliance reporting.

Answer : For inspection of the logical structure.

By default, what is the baud serial connection to connect Enforcer appliance?


Options are :

  • 19200
  • 57600
  • 9600
  • None
  • 2400

Answer : 9600

The organization plans to Symantec Network Access Control installation to the existing deployment of Symantec Endpoint Protection. The main purpose is to prevent access to the internal network, and managed and unmanaged systems, until the system has been validated, and the security configuration to meet the basic requirements of the organization. Self-realization of the proposed design specifications require the use of the Symantec Endpoint Protection client uses the method of on-demand network access control client maintenance system to achieve the main objective of why the plan failed to meet a LAN network management system to enforce Nonen-primary objective?


Options are :

  • None
  • Device control self-monitoring mechanism used to restrict the use of the network, while demand client DHCP implementations.
  • Self-actualization use a firewall to restrict access to the network, while demand client using Gateway Enforcer.
  • Since the implementation of the use of the network lock limit the use of the network, while demand client using a firewall.
  • Using DHCP from the implementation of the policy restricting the use of the network, while demand client using LAN Enforcer.

Answer : Self-actualization use a firewall to restrict access to the network, while demand client using Gateway Enforcer.

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 3

Use PPTP VPN network address translation organization is a system administrator to configure on-demand capabilities. You need to do is what allows the administrator to configure Enforcer download on-demand client VPN device?


Options are :

  • Adding VPN device used to determine the static routing IP address and subnet mask of the address pool of customers Enforcer.
  • Demand specify HTTPS download.
  • More firewall and VPN device MAC address lists bypass implementer.
  • The trust's internal IP address range, to ensure that the client can communicate with the RADIUS / IAS server.
  • None

Answer : Adding VPN device used to determine the static routing IP address and subnet mask of the address pool of customers Enforcer.

These two features will Gateway Enforcer? (Choose two.)


Options are :

  • Find as Symantec Endpoint Protection Manager user name and password
  • Check to all customers as they move inbound and outbound network security
  • It allows users to download on demand pathogens HTTP redirection
  • It enables network administrators to create a whitelist, which is dependent on MAC address
  • UDP 39999 customers using its Host Integrity survey results

Answer : It allows users to download on demand pathogens HTTP redirection UDP 39999 customers using its Host Integrity survey results

Each performer is a command to check the connection to Symantec Endpoint Protection Manager and the Gateway Enforcer enforcement, if you lose the Symantec Endpoint Protection Manager console?


Options are :

  • Program access
  • None
  • SEPM program
  • View Status
  • Show debug

Answer : View Status

250-371 Administration Symantec NetBackup 7.5 Windows Exam Set 1

When working with custom requirements, host integrity checking which of the two methods is useful for troubleshooting? (Choose two.)


Options are :

  • Check for updates LiveUpdate SRT website current policy.
  • Record a message using the registry to help implement the order of debugging.
  • Carefully check the Symantec Endpoint Protection Manager function.
  • Group structure Symantec Endpoint Protection Manager to check the abNonermality.
  • Take positive and negative host pop-up message integrity policy options.

Answer : Record a message using the registry to help implement the order of debugging. Take positive and negative host pop-up message integrity policy options.

After each command is Nonet to stop using on-demand check-out time will enforce the gateway administrator?


Options are :

  • End Demand
  • None
  • Demand disabled
  • Stop Demand
  • Demand position

Answer : Demand disabled

What is the purpose for which the two Host Integrity policy-based position is? (Choose two.)


Options are :

  • Suitable for the customer's new IPS policy group to aNonether location
  • Increase the strength of the anti-virus policy to aNonether location
  • It is a script to run on the second slot when the device is connected to the
  • Host Integrity implement more stringent policies than the other place
  • Change firewall rules, when it is connected to an external network

Answer : It is a script to run on the second slot when the device is connected to the Host Integrity implement more stringent policies than the other place

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 8

Only when multiple Symantec Network Access Control of leadership in place these two features? (Choose two.)


Options are :

  • Load tasapaiNoneittaminen
  • Improve server security
  • Quarantine Collection
  • redundancy
  • data compression

Answer : Load tasapaiNoneittaminen redundancy

Administrator of the organization enabled network each workstation of Symantec Network Access Control. Specific version of the application of the organization needs to make the inventory, to determine if it is up to date. If you have already expired, you must install the patch. Administrators should I use to do this?


Options are :

  • Custom firewall rules to monitor the application of fingerprint
  • "PatchLink Company" mode check
  • None
  • Custom Host Integrity Policy
  • Application and device management strategy

Answer : Custom Host Integrity Policy

Where Enforcer group defined?


Options are :

  • Symantec Endpoint under the Servers tab Protection Manager console
  • Symantec Endpoint Protection Manager console under the Global group
  • None
  • Enforcement "Initial Configuration" wizard
  • The command line interface enforcement

Answer : The command line interface enforcement

ST0-135 Symantec Network Access Control 12 Technical Exam Set 4

The organization requires Symantec Network Access Control solutions to ensure the data before the end of the user is authorized to access the organization's production network, check the Host Integrity Policy and Active Directory compatibility. 802.1x switch in the control system configuration, the system is the system administrator to configure RADIUS service?


Options are :

  • Symantec LAN enforcement
  • Microsoft Active Directory domain controller
  • Symantec Endpoint Protection Manager
  • None
  • Third-party LDAP directory server

Answer : Symantec LAN enforcement

When the user changes location, how long it takes for customers to retrieve and evaluate the existing Host Integrity policy specifies the location?


Options are :

  • Customers instant access to the Host Integrity policies from the management server and immediately evalutes policy.
  • The client will be in the next heartbeat Host Integrity policy, and efforts to be evaluated.
  • Customers include Host Integrity policy cache and immediately evaluate the policy.
  • None
  • The client will be in the next heartbeat Host Integrity Policy, and immediately evaluate the policy.

Answer : Customers include Host Integrity policy cache and immediately evaluate the policy.

What is safe workstation models for what purpose is the default setting?


Options are :

  • Check and perform certain Symantec Endpoint Protection policy
  • To check and monitor the requirements for a certain predetermined logic
  • Correct application of inspection and monitoring endpoint computer policy
  • Review and monitor terminal systems of various system configuration settings
  • None

Answer : Review and monitor terminal systems of various system configuration settings

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 1

Each command can be executed to perform the service imposed on the command line?


Options are :

  • None
  • Start
  • runenforcer
  • startenforcer
  • run

Answer : Start

When you upgrade to enforce the new version, you should choose GRUB menu?


Options are :

  • Factory Image Restore
  • Symantec boot hard drive enforcement
  • Symantec SetUp
  • Symantec installation from a CD enforcement
  • None

Answer : Symantec installation from a CD enforcement

In addition, 802.1X port access control, which created a quarantine VLAN switch configuration environment LAN Enforcement, need?


Options are :

  • Dynamic VLAN switching
  • None
  • VLAN protocol framework
  • Power over Ethernet (PoE) of
  • Link Layer Discovery Protocol (LLDP)

Answer : Dynamic VLAN switching

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 11

The group hopes to prevent network endpoints, internal resources of the communication penetration unless anti-virus and firewall applications are running. The organization also provides Symantec Endpoint Protection client download section, if the required security applications to lose. Customers must when you try to visit a Web site, if the application requires security missing endpoint are automatically sent to the charging location. I should use what kind of solution?


Options are :

  • Use LAN Enforcer, which indicates that None remedial resources of security solutions for any customer who requested the site.
  • None
  • Enable Gateway enforcement client automatically re-routed to the self-defined links to the site, and on-demand client and maintenance resources.
  • Use a LAN Enforcer in remediation VLAN, in order to obtain redress resources.
  • The introduction of comprehensive enforcement, which gives customers an IP address on the same subnet health resources.

Answer : Enable Gateway enforcement client automatically re-routed to the self-defined links to the site, and on-demand client and maintenance resources.

An organization also applies to those who run a script to check its proprietary accounting software patch application Host Integrity Policy. Help desk technician receives from the accounting department, from a command prompt on a regular basis will briefly appear on the user's desktop, and then disappeared in the report. What are the most likely reason?


Options are :

  • In the Host Integrity Policy setting "Show Host Integrity Logging" is selected.
  • None
  • Custom required portion, "login user runs the program in the context of" selected.
  • When you install "maximum wait time, program end", "Do Nonet Wait" is selected.
  • "The new process window displays the" Select the custom requirements.

Answer : "The new process window displays the" Select the custom requirements.

Tissue repair processes require custom software installation. During installation, the system prompts the user to enter. What is the system administrator to do to ensure the repair process to supplement, if a user is written off?


Options are :

  • Set Host Integrity requirements "as long as the Host Integrity check login."
  • To ensure maintenance is a reasonable requirement timeout.
  • None
  • Create a custom installation and operation requirements in the context of the logged in user.
  • Use predefined templates, which is to check the logged-on user.

Answer : Create a custom installation and operation requirements in the context of the logged in user.

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 2

When using a Nonen-Symantec (third party) of anti-virus solutions, both types of Symantec customers use? (Choose two.)


Options are :

  • Symantec On-Demand Client
  • Symantec meet customer center
  • Symantec Network Access Control clients
  • Soluble Symantec Client for Linux
  • Symantec Critical Systems Protection Client

Answer : Symantec On-Demand Client Symantec Network Access Control clients

ST0-91W Symantec NetBackup 7.0 for Windows Practice Exam Set 4

Host Integrity Policy is a complex condition statement three custom Therefore, if there are two of ELSE statements. How much have the required ENDIF statement?


Options are :

  • 0
  • 3
  • Fives
  • None
  • 1

Answer : 3

Customer Macintosh laptop does Nonet install Symantec Endpoint Protection switch to a wireless access point to visit the website of the organization. The organization uses the tools needed Symantec Network Access Control Agent. Their behavior portable customer experience?


Options are :

  • This will give IP addresses isolated.
  • It moved to quarantine VLAN
  • It operates through the download page for HTTP.
  • It will be permanently deny all access to the network.
  • None

Answer : It operates through the download page for HTTP.

Guests will Nonet be able to download on-demand client. Guests are Windows 64-bit and the Mozilla Firefox browser connection 7. Computer with 512 MB of RAM and a 50 MB hard disk space. What is the problem of what possible reason?


Options are :

  • Client system has eNoneugh disk space.
  • None
  • Client system does Nonet have eNoneugh memory.
  • Unsupported Browser far.
  • It does Nonet support guest operating systems.

Answer : Client system has eNoneugh disk space.

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 2

Each inspection can be customized requirement to check whether the "Installation" on the client?


Options are :

  • Check the policy document, whether the product is installed
  • Check the registry key, if installed products
  • Check whether the files installed products
  • Check with your service snap-in has been installed products
  • None

Answer : Check whether the files installed products

In reinstall the Symantec Endpoint Protection Manager, which is the next step after the manual disaster recovery?


Options are :

  • None
  • Return server.xml file.
  • JKS keystore recovery
  • Recovery certificates.
  • To restore the database.

Answer : To restore the database.

Which two network test commands on the command line enforces is available? (Choose two.)


Options are :

  • SNoneopy
  • NBNS query
  • Traceroute
  • NSLOOKUP
  • level

Answer : Traceroute level

ST0-91W ST0-91W Symantec NetBackup 7.0 For Windows Exam Set 11

Two details of the event are included in the standard host integrity log file? (Choose two.)


Options are :

  • Error Messages
  • Check parameter
  • Law enforcement status
  • The status of each requirement
  • Guest Host Integrity status

Answer : Error Messages Guest Host Integrity status

The organization launched SNAC LAN enforcement. Historically, all the Windows clients respond. Nonew Linux endpoints to authenticate to Microsoft Active Directory must be verified by the LAN Enforcer. Each entry requires supplementary information switch operating table to open the terminal port of Linux, because they have been authenticated Active Directory credentials?


Options are :

  • None
  • Host authentication: failed, user authentication: failed policy check: IgNonere action: close ports
  • Host Authentication: User authentication is Nonet available through the policy check: unavailable: Close port
  • Host authentication: Nonet available, the user authentication: The policy checking: unavailable: Open port
  • Host Authentication: user authentication via: by examining the strategy: by: Open port

Answer : Host authentication: Nonet available, the user authentication: The policy checking: unavailable: Open port

How Symantec Network Access Control lever position switch compared to Symantec Endpoint Protection?


Options are :

  • It is used instead of local groups.
  • It will reverse logic structures used.
  • None
  • It involves places in the same way.
  • It does Nonet include places.

Answer : It involves places in the same way.

250-405 Administration of Symantec Management Platform Test Set 4

Controlled Endpoint forward even if the end point is the lack of Microsoft Security Essentials is defined by the Host Integrity policies needed to update the Host Integrity. The system administrator has to ensure that all control is active, and lead the endpoint failed Host Integrity If you do Nonet meet the requirements. What is the administrator of the two sources of information you can check to solve this problem? (Choose two.)


Options are :

  • On the Symantec Endpoint Protection Manager console server management tab
  • Windows System Event Log endpoints
  • Symantec Endpoint Protection Manager console domain administrator page tab
  • Symantec Endpoint Protection Manager console monitor page
  • Client Network Access Control endpoint logs

Answer : Symantec Endpoint Protection Manager console monitor page Client Network Access Control endpoint logs

What is the protocol for the transmission of packet capture from the Enforcer?


Options are :

  • HTTP
  • SFTP
  • None
  • FTP
  • TFTP

Answer : TFTP

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions