ST0-237 Symantec Loss Prevention Technical Assessment Exam Set 10

Symantec to enforce Suite 9.0, if an administrator wants to evaluate the assets compared to the reference to the commodity, which is used for?


Options are :

  • reference level
  • gold standard
  • the reference to assessment
  • None
  • policy mapping

Answer : gold standard

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 6

Which two options can notify users when an SMTP e-mail support to prevent network? (Choose two.)


Options are :

  • Web Proxy generated e-mail notification
  • MTA generated delivery status notification
  • Symantec detection rule generated e-mail notification
  • Symantec FlexResponse plug-in generated e-mail notification
  • Symantec response rule created for e-mail notification

Answer : MTA generated delivery status notification Symantec response rule created for e-mail notification

How the system administrator to confirm that the policy has been updated and saved, it is enabled to detect a specific server?


Options are :

  • None
  • Check whether the policy had been charged under System> Servers> Alerts
  • Check whether the policy had been charged under System> Servers> Events
  • Check the status of the policy policy list page
  • Check the policy and confirm the date and time it was last updated

Answer : Check whether the policy had been charged under System> Servers> Events

Which three can be installed bv-Control for Windows MQE? (Choose three.)


Options are :

  • settings
  • setup.exe
  • bv-Config Utility
  • RMS configuration
  • bv-Control for Windows Setup Wizard

Answer : setup.exe bv-Config Utility bv-Control for Windows Setup Wizard

250-405 Administration of Symantec Management Platform Test Set 1

The scanner does not return results after the end of the review process. What file should be removed to remove the previous scanning issues?


Options are :

  • scanner_typeScanner.cfg
  • Clean.exe
  • None
  • ScannerControllerLogging.properties
  • logs

Answer : scanner_typeScanner.cfg

DLP agent is connected to the corporate network through a VPN. The administrator will see warning icon associated with the agent Agent overview page, select Enforce user interface. The administrator defines the warning associated with failure to update Active Directory group membership. What should the administrator do?


Options are :

  • Update Active Directory Services
  • Install DLP Agent
  • Start DLP Agent
  • Start the Endpoint Server
  • None

Answer : Start DLP Agent

Inside a result of the assessment, the status Unknown is usually defined to check the values?


Options are :

  • items missing data
  • None
  • the filter data items
  • prerequisite
  • check expression

Answer : items missing data

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 8

Which technique is used to select the Data Processing Service data acquisition device, when the number of data collectors are configured to support the site?


Options are :

  • round robin
  • shortest job next
  • most recently used
  • truck-based
  • None

Answer : round robin

What are two benefits not offered Policy Module? (Choose two.)


Options are :

  • defines several, overlapping regulatory, industry-specific or best practices framework for the coverage areas
  • identify the problems under the supervision of the policy or internal policy and prevent failure or security breach
  • integrating existing compliance declaration process management systems
  • determines reviews, and distribute written policies in relation to end-users as mapped to a specific measurable controls
  • reduce the creation and maintenance of policies and measures the knowledge and conservation policy

Answer : defines several, overlapping regulatory, industry-specific or best practices framework for the coverage areas determines reviews, and distribute written policies in relation to end-users as mapped to a specific measurable controls

Two requirements must be met to successfully use the network monitoring Windows-based detection of server? (Choose two.)


Options are :

  • WinPcap must be installed on a Windows system.
  • Wireshark is installed on a Windows system.
  • Network Card must support jumbo frames.
  • At least two network interfaces MUST be available.
  • ARP proxy server is able to ensure the Windows captures all traffic.

Answer : WinPcap must be installed on a Windows system. At least two network interfaces MUST be available.

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 2

The test is performed on one or more resources in order to determine accept or reject status. What is this test is called?


Options are :

  • Filter
  • None
  • standard
  • Check
  • judgment

Answer : Check

What Symantec to monitor the use of Suite 9.0 helps you organize how and where the information is collected?


Options are :

  • holding
  • organizational units
  • None
  • domain Names
  • sites

Answer : sites

When configuring the bv-Control for Microsoft SQL Server, including two authentication options? (Choose two.)


Options are :

  • Windows Authentication
  • Pass-through authentication
  • Basic authentication
  • Certificate-based authentication
  • SQL authentication

Answer : Windows Authentication SQL authentication

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 6

How many attachments can be associated with an exception request?


Options are :

  • None
  • 2
  • 1
  • 3
  • 4

Answer : 1

Each use case could be solved by using the "Sender / user is responsible for the group based on Directory Server Group", whose detection rule?


Options are :

  • Produce business case is based on a custom attribute
  • Allow login to monitor based on Active Directory (AD) group membership
  • Identify a group of users based on Active Directory (AD) group membership
  • To solve business attribute LDAP search plugin
  • None

Answer : Identify a group of users based on Active Directory (AD) group membership

In any cases appear in the Network Incident List, the network in order to prevent the effect of the filter is set to Modified?


Options are :

  • caused by confidential content was removed from the SMTP e-mail
  • attachments were removed due to an SMTP e-mail
  • None
  • caused by digital rights applied to SMTP e-mail attachments
  • in cases where SMTP email was changed to include a specific title

Answer : in cases where SMTP email was changed to include a specific title

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 5

The report model is scheduled. Where Result Report be located?


Options are :

  • Monitor> Jobs
  • Predefined Reports
  • My Documents folder
  • None
  • My reports

Answer : My reports

Those two fields are common to all asset classes? (Choose two.)


Options are :

  • Authentication
  • Access Vector
  • Asset Location
  • Asset Administrator
  • confidence

Answer : Asset Location confidence

Two of which are classified as impossible to deal with components of traffic report data elements? (Choose two.)


Options are :

  • traffic flow that is damaged
  • Packets arrive out of order
  • Traffic contains a password protected doc file
  • Transport, including jpg image
  • Excavation limit that has been exceeded

Answer : traffic flow that is damaged Excavation limit that has been exceeded

ST0-085 Symantec Security Information Manager Technical Exam Set 2

What should be used to detect the source of current information about the customer?


Options are :

  • The index equivalent document (IDM)
  • Exact matching data (EDM)
  • data identifier rules
  • file type rule condition
  • None

Answer : The index equivalent document (IDM)

Two collector types can be imported assets Symantec to enforce Suite 9.0 property system? (Choose two.)


Options are :

  • XML
  • DPS
  • CSV
  • domain
  • default

Answer : CSV default

What can e-mail Block do to protect your confidential information in outbound email?


Options are :

  • edit the e-mail body controlled by the quarantine camp location
  • None
  • add the title of the e-mail encryption gateway route
  • Use FlexReponse plug-in to change the e-mail operators
  • edit the e-mail attachment to remove confidential information

Answer : add the title of the e-mail encryption gateway route

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 3

What are the two types of detection condition responsible for any envelope, Subject, Body, and Attachment Parts? (Choose two.)


Options are :

  • Detailed information corresponding to each other
  • a data identifier
  • keyword
  • name of the file
  • Indexed Document Match

Answer : a data identifier keyword

Where four bv-Control platforms supported by Symantec to monitor Suite 9.0 Standards? (Choose four.)


Options are :

  • Windows
  • UNIX
  • Oracle
  • SQL
  • NetWare
  • Exchange

Answer : Windows UNIX Oracle SQL

Two collector types can be imported assets Symantec to enforce Suite 9.0 property system? (Choose two.)


Options are :

  • XML
  • CSV
  • DPS
  • domain
  • default

Answer : CSV default

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 2

Endpoint Prevent: Report response rule is defined as Korean, English, and Chinese (in that order). Every pop-up language is Japanese Windows user-March to see?


Options are :

  • Korean
  • English
  • Chinese
  • Japanese
  • None

Answer : Korean

Two detection with the server can match the recipient corresponds to a model rule? (Choose two.)


Options are :

  • Instant Messaging Name
  • IP address of the Web server
  • Mac address
  • Webmail URL
  • Windows username

Answer : IP address of the Web server Webmail URL

Which three can be installed bv-Control for Windows MQE? (Choose three.)


Options are :

  • bv-Config Utility
  • bv-Control for Windows Setup Wizard
  • settings
  • setup.exe
  • RMS configuration

Answer : bv-Config Utility bv-Control for Windows Setup Wizard setup.exe

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 9

Which two fallback options are available on the web Block: Remove HTTP / HTTPS response to the contents of the rule? (Choose two.)


Options are :

  • Block the content posted
  • Remove the contents of FlexResponse
  • Specifies another site posts
  • Send an encryption gateway
  • Allows content posted

Answer : Block the content posted Allows content posted

What are two ways to match the event to provide information about the text? (Choose two.)


Options are :

  • Reporting API
  • CSV export
  • XML export
  • syslog notification
  • E-mail Notification

Answer : Reporting API XML export

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions