ST0-237 Symantec Loss Prevention Technical Assessment Exam Set 1

When to Explore Network Scanners to use?


Options are :

  • scan data warehouses that require the use of special interface to read
  • find an open file shares online
  • automatically delete sensitive files from data warehouses
  • None
  • scan and index documents remote servers for use policies

Answer : scan data warehouses that require the use of special interface to read

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 1

Each service is responsible for the importing of commodities as a CSV file?


Options are :

  • None
  • Application Server Service
  • Data processing Service
  • index Support
  • Service Management Services

Answer : Data processing Service

How agentless resource for data collection can improve the speed of large network?


Options are :

  • Install the console with a faster machine
  • To set up a number of information server deployments online
  • None
  • Tune the SQL database performance
  • Install the RMS and Symantec to enforce Suite 9.0 in the same box

Answer : To set up a number of information server deployments online

What is the correct syntax in order to create IP filter Network Monitor?


Options are :

  • / -, source, destination,
  • According to the on / off, source, destination,
  • Include / exclude, destination, source
  • None
  • destination, source, + / -

Answer : destination, source, + / -

250-405 Administration of Symantec Management Platform Test Set 3

Unsafe condition respondent can see basic information about the case, but is not able to view the details of the incident. What is the composition of this task?


Options are :

  • The view is selected, and all the display characteristics are not selected.
  • Server Manager is selected rights.
  • Custom attributes are selected and set to read-only.
  • None
  • Reports Access tab conditions are defined.

Answer : The view is selected, and all the display characteristics are not selected.

Each profile contains the information that allows VPN is the solution to your tablet On Demand functionality of Data Loss Prevention?


Options are :

  • DLP Agent profile
  • iOS profile
  • SCEP profile
  • None
  • VPN profile

Answer : iOS profile

Relative to the workflow rights, which is the first step, which is carried out?


Options are :

  • import entitlements
  • None
  • Collect company information
  • Make helm
  • Specify the owner of the information

Answer : Make helm

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 8

Information security officer has detected unauthorized tool table is used to transfer data encrypted communications. Every Data Loss Prevention feature can prevent this tool from using confidential information?


Options are :

  • The application path filtering
  • application monitoring
  • None
  • Network protocol monitoring
  • Removable memory monitoring

Answer : application monitoring

What feature allows for future data mining data Force which is based on a report ID?


Options are :

  • Report Save As
  • Data Extraction API
  • None
  • CSV Export
  • Reporting API

Answer : Reporting API

What is the application or the destination is selected by default endpoint monitoring?


Options are :

  • storage solution
  • None
  • e-mail
  • Instant messaging
  • the local station

Answer : storage solution

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 10

How to policy applied to network Discover the scans?


Options are :

  • choosing the right policy Amendment Destination
  • by Network Policy Server Access
  • selecting the right targets to drive policy
  • None
  • determining policy groups of scan target

Answer : determining policy groups of scan target

Every situation can be monitored, as well as Network Monitor and Endpoint block?


Options are :

  • Employee use Internet Explorer 7 to send confidential information to your Gmail account using https.
  • 2 The employee is using the Chrome browser to send confidential information to a newsgroup using http.
  • None
  • The worker uses the AIM to send instant messages while out of a corporate network.
  • An employee uses Skype to send an instant message to a friend's competitor's site.

Answer : 2 The employee is using the Chrome browser to send confidential information to a newsgroup using http.

Each delimiter is acceptable Exact Data Matching (EDM) data sources?


Options are :

  • the pipe (|)
  • status
  • semi-colon (;)
  • forward slash (/)
  • None

Answer : the pipe (|)

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 11

How Data Loss Prevention administrator to check the health of a network monitoring server?


Options are :

  • checking the configuration details of the System Settings page
  • When considering the results of the Ministry of the Environment Check Utility (ECU)
  • finding out the warning message emails generated or received
  • None
  • by checking the Incident Queue and Message Waiting time is a system overview page

Answer : by checking the Incident Queue and Message Waiting time is a system overview page

What two recommendations will be the organization complies with the introduction of Endpoint block? (Choose two.)


Options are :

  • Initially can be monitored by the local file system.
  • To test the agent in a variety of end-user's pictures.
  • Specifies the test, and tune the filters.
  • Set up blocking when the substances are used.
  • Can be monitored to many destinations and protocols at the same time.

Answer : To test the agent in a variety of end-user's pictures. Specifies the test, and tune the filters.

Reports> Predefined Folder, which the two actions a user can perform? (Choose two.)


Options are :

  • More report templates CSV files
  • Schedule report templates
  • Edit report template features to add user-defined values
  • Delete report templates
  • Customize specific report templates

Answer : Schedule report templates Customize specific report templates

250-405 Administration of Symantec Management Platform Test Set 5

Which function to transfer confidential information in a safe place, when the endpoint is scanned targets?


Options are :

  • None
  • Protect Network Quarantine
  • Endpoint Block Block
  • Endpoint quarantine
  • Discover Network Remediation

Answer : Endpoint quarantine

How to configure the system reports to a safe distribution?


Options are :

  • filtration Incident List Reports
  • Web Archive
  • as links
  • None
  • e-mail body text

Answer : as links

Which Symantec to enforce Suite 9.0 component is responsible for most transactions between components?


Options are :

  • None
  • index Support
  • Application Server Service
  • Data processing Service
  • Service Information Server

Answer : Application Server Service

ST0-085 Symantec Security Information Manage Technical Exam Set 5

Every throttling option is available when creating a SharePoint Server Discover target?


Options are :

  • the maximum detected errors
  • select sites per hour
  • the maximum request from the front-end server
  • The maximum amount per minute
  • None

Answer : The maximum amount per minute

How the permits are granted predefined objects?


Options are :

  • Authorizations shall be issued in Active Directory.
  • Access can be granted only CCS administrators.
  • Permits are granted automatically when the user is added to the role.
  • An administrator must manually add licenses
  • None

Answer : Permits are granted automatically when the user is added to the role.

Three of which are conditions of the RMS installation? (Choose three.)


Options are :

  • Microsoft SQL Server 2005 Express
  • Internet Information Server
  • Microsoft .NET Framework 2.0
  • Windows Installer 3.1
  • Crystal Report 2008

Answer : Microsoft SQL Server 2005 Express Microsoft .NET Framework 2.0 Windows Installer 3.1

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 3

By the two dates must be selected when creating an exception request? (Choose two.)


Options are :

  • date of evaluation
  • Start Date
  • the effective date
  • expiration date
  • the due date

Answer : the effective date expiration date

Every command line to build a custom authentication keys in order to improve the safety of the data that is sent to the Enforce Server and the detection servers?


Options are :

  • servertool
  • Keytool
  • None
  • endpointkeytool
  • sslkeytool

Answer : sslkeytool

Which of the two components is needed Symantec Data Loss Prevention solution in addition to the Tablet Tablets Prevent and control the servers? (Choose two.)


Options are :

  • Mobile Device Management
  • Web Proxy
  • Exchange Server 2010
  • DLP agent
  • Virtual Private Network Gateway

Answer : Web Proxy Virtual Private Network Gateway

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 2

Two conditions can be specified when creating the event a condition for the role? (Choose two.)


Options are :

  • amended
  • file Types
  • policy group
  • Custom attribute
  • file size

Answer : policy group Custom attribute

Which term refers to the types of rules the government in response to the law?


Options are :

  • policy
  • framework
  • benchmark
  • standard
  • adjustment

Answer : adjustment

In order to create reports to monitor Symantec Suite 9.0 (CCS 9.0), with Crystal Reports 2008 installed on the engine?


Options are :

  • Data Processing Technology Reporter configured role
  • All computers Data Processing Service
  • The server, CCS Console 9.0
  • The application server that manages reporting jobs
  • None

Answer : Data Processing Technology Reporter configured role

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 5

For greater precision, which is the minimum recommended number of columns in the data source for use in precision matching data (EDM) profile?


Options are :

  • 3
  • 5
  • 4
  • None
  • 2

Answer : 3

What feature should be the case the defendant begins to use to find out where the attachment has created other offenses?


Options are :

  • Matches policy
  • case information
  • None
  • case History
  • report filters

Answer : report filters

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions