ST0-237 Symantec Loss Prevention Technical Practice Exam Set 7

How many attachments can be associated with an exception request?


Options are :

  • 4
  • 1
  • 2
  • 3

Answer : 1

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 8

Which two are categorized as unprocessable components in the traffic report? (Select two.)


Options are :

  • Extraction limit that has been exceeded
  • Traffic that contains jpg image
  • Packets arriving out of order
  • Traffic containing a password protected doc file
  • traffic stream that is corrupted

Answer : Extraction limit that has been exceeded traffic stream that is corrupted

When configuring bv-Control for Microsoft SQL Server, which two authentication options are available? (Select two.)


Options are :

  • Pass-through authentication
  • SQL authentication
  • Certificate-based authentication
  • Windows authentication
  • Basic authentication

Answer : SQL authentication Windows authentication

Which two options can be used to notify users when SMTP emails are blocked with Network Prevent? (Select two.)


Options are :

  • Symantec detection rule generated email notification
  • Web Proxy server generated email notification
  • Symantec response rule generated email notification
  • MTA generated delivery status notification
  • Symantec FlexResponse plug-in generated email notification

Answer : Symantec response rule generated email notification MTA generated delivery status notification

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 1

Which two can a detection server match on with a recipient matches pattern rule? (Select two.)


Options are :

  • Windows username
  • Webmail server URL
  • IP address of a Web server
  • Instant Messaging Name
  • MAC address

Answer : Webmail server URL IP address of a Web server

When collecting data from assets, what is the primary factor in determining the types of data that will be collected?


Options are :

  • baseline
  • reference asset
  • scope
  • standard

Answer : standard

Which two fields are common to all asset types? (Select two.)


Options are :

  • Access Vector
  • Authentication
  • Asset Administrator
  • Confidentiality
  • Asset Location

Answer : Confidentiality Asset Location

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 3

A scanner fails to return results upon completion of the scan process. Which file should be removed to eliminate previous scan issues?


Options are :

  • Clean.exe
  • logs
  • scanner_typeScanner.cfg
  • ScannerControllerLogging.properties

Answer : scanner_typeScanner.cfg

Symantec recommends that new deployments of Data Loss Prevention replace the default encryption certificates used for securing communication between the Enforce Server and detection servers. What is the correct utility for generating new certificates for this communication?


Options are :

  • endpointkeytool.exe
  • kinit.exe
  • certutil.exe
  • sslkeytool.exe

Answer : sslkeytool.exe

A report template has been scheduled. Where will the resulting report be located?


Options are :

  • Predefined Reports
  • My Reports
  • Monitor > Jobs
  • My Documents folder

Answer : My Reports

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 3

What is a possible solution when a Network Discover server is unable to scan a remote file server?


Options are :

  • Use the fully qualified name (FQDN) of the server
  • Mount the IPC$ share on the file server
  • Verify that the target file server is a Windows 2000 server
  • Verify that the file server has .NET services running

Answer : Use the fully qualified name (FQDN) of the server

Which tool is provided by default to edit a database on an endpoint?


Options are :

  • . wdp.exe
  • update_configuration.exe
  • vontu_sqlite3.exe
  • logdump.exe

Answer : vontu_sqlite3.exe

In Symantec Control Compliance Suite 9.0, if an administrator wants to evaluate assets compared to a referenced asset, what is used?


Options are :

  • policy mapping
  • baseline standard
  • gold standard
  • reference evaluation

Answer : gold standard

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 7

Which two tasks are performed in the Symantec Management Platform? (Select two.)


Options are :

  • Change Endpoint Agent log levels
  • Gather Enforce logs
  • Gather Monitor logs
  • Change Monitor operational log levels
  • Restart Agents

Answer : Change Endpoint Agent log levels Restart Agents

Which two should be used to collect log information from Enforce servers? (Select two.)


Options are :

  • Enable the VontuSNMP service and set the community strings accordingly
  • Access the Enforce Log Viewer page at https:///logs?view=true
  • Navigate manually to the log directory of the Enforce server installation
  • Use dbgmonitor from sysinternals to connect to the debug output of the service
  • Use the Log Collection and Configuration tool

Answer : Navigate manually to the log directory of the Enforce server installation Use the Log Collection and Configuration tool

On which protocols does Symantec Data Loss Prevention use port-based protocol recognition?


Options are :

  • Secure tunnelling protocols
  • User-configured TCP protocols
  • User-defined IP protocols
  • System-defined UDP and TCP protocols

Answer : User-configured TCP protocols

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 5

What are two possible ways to provide incident match text information? (Select two.)


Options are :

  • XML export
  • Reporting API
  • CSV export
  • Syslog notification
  • Email notification

Answer : XML export Reporting API

A test is performed against one or more assets in order to determine a pass or fail status. What is this test called?


Options are :

  • Filter
  • Check
  • Standard
  • Evaluation

Answer : Check

Which technique is used to select a Data Processing Service data collector when multiple data collectors are configured to support a site?


Options are :

  • round robin
  • most recently used
  • load based
  • shortest job next

Answer : round robin

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 1

What can Email Prevent do to protect confidential data in an outgoing email?


Options are :

  • modify the email attachment to remove confidential information
  • modify the email body to redirect to a quarantine location
  • add a header to an email to route to an encryption gateway
  • use a FlexReponse plug-in to modify the email header

Answer : add a header to an email to route to an encryption gateway

How can an administrator validate that once a policy is updated and saved it has been enabled on a specific detection server?


Options are :

  • Check the policy and validate the date and time it was last updated
  • Check to see whether the policy was loaded under System > Servers > Alerts
  • Check the status of the policy on the policy list page
  • Check to see whether the policy was loaded under System > Servers > Events

Answer : Check to see whether the policy was loaded under System > Servers > Events

What are two reasons why a company should implement data loss prevention? (Select two.)


Options are :

  • To protect the CISO from liability due to a security breach
  • To demonstrate regulatory compliance
  • To prevent employee malicious activity
  • To protect brand and reputation
  • To prevent the threat of malware

Answer : To demonstrate regulatory compliance To protect brand and reputation

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 7

Which databases are created by Symantec Control Compliance Suite 9.0 Reporting and Analytics during installation?


Options are :

  • bv, Compliance Manager, Policy Manager
  • Production, Reporting, Evidence
  • Evidence, Standards, Policies
  • Dashboard, Reporting, SMC

Answer : Production, Reporting, Evidence

How are the Enterprise Security Manager settings configured for use by the Data Processing Service?


Options are :

  • per organizational unit
  • per group
  • per site
  • per domain

Answer : per site

How many instances of the Enterprise Configuration Service should be installed?


Options are :

  • Two (cluster configuration)
  • One per Windows domain
  • One per enterprise
  • One per query engine

Answer : One per enterprise

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 4

Which Symantec Control Compliance Suite 9.0 component is responsible for routing data collection, evaluation, and reporting jobs?


Options are :

  • load balancer
  • collector
  • application server
  • Management Service

Answer : load balancer

Which three Enterprise Security Manager policy-run options can be configured in Symantec Control Compliance Suite 9.0? (Select three.)


Options are :

  • Run policy n days before collecting data
  • Run policy before collecting data
  • Collect data from last policy run
  • Run policy if data is older than n days
  • Collect data from last n policy runs

Answer : Run policy before collecting data Collect data from last policy run Run policy if data is older than n days

Which traffic type will be excluded from analysis?


Options are :

  • Yahoo! Instant Messenger
  • NNTP
  • Telnet
  • Skype

Answer : Skype

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 4

What should be used to detect existing source code information for a customer?


Options are :

  • file type rule condition
  • Exact Data Matching (EDM)
  • data identifier rules
  • Index Document Matching (IDM)

Answer : Index Document Matching (IDM)

Which three can be used to install a bv-Control for Windows MQE? (Select three.)


Options are :

  • configuration settings
  • bv-Control for Windows Configuration Wizard
  • setup.exe
  • RMS configuration
  • bv-Config Utility

Answer : bv-Control for Windows Configuration Wizard setup.exe bv-Config Utility

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions