無料セールまもなく終了!100%有効250-550試験問題集に72問題と解答が待ってます [Q15-Q39]

Share

無料セールまもなく終了!100%有効250-550試験問題集に72問題と解答が待ってます

検証済み250-550問題集と解答であなたを合格確定させるSymantec SCS Certification試験解答!


Symantec 250-550 認定試験の出題範囲:

トピック出題範囲
トピック 1
  • Describe how content updates can be modified for various network configurations
  • Describe the benefits of adopting a cloud-based endpoint security solution
トピック 2
  • Describe false positives, their impact, and how SES can be used to mitigate them
  • Describe how SES can be used to protect endpoints against zero-day attacks
トピック 3
  • Describe how to use the SES management console to configure administrative reports
  • Describe SES content update types and how they are distributed to endpoints
トピック 4
  • Describe threat artifacts and the best practices to follow after a major endpoint security event
  • Describe LiveUpdate functionality and configuration options
トピック 5
  • Describe Advanced Machine Learning and how SES employs this protection to protect endpoints against unknown threats
  • Describe how the Cyber Defense Manager is used to identify threats in an environment
トピック 6
  • Describe the tools and techniques included in SES to adapt security policies based upon threat detections
  • Describe the steps that can be taken to remediate threats locally on an endpoint
トピック 7
  • Describe IPS and how it is used in detecting and preventing unwanted network traffic
  • Describe the client communication model and how to verify client connectivity
トピック 8
  • Describe the various methods SES uses to identify unmanaged endpoints
  • Describe various Memory Exploit Mitigation techniques and how SES protects against them
トピック 9
  • Describe device control and how SES can be used to control device access
  • Describe the requirements and process for SEPM integration with the Cyber Defense Manager platform used in SES
トピック 10
  • Describe the network requirements needed for connecting endpoints to the cloud management platform
  • Describe how to utilize console data to identify and endpoints security status
トピック 11
  • Describe the SES system requirements and supported operating systems
  • Describe the account access and authentication methods available in SES

 

質問 15
Which Security Control dashboard widget should an administrator utilize to access detailed areas for a given security control ?

  • A. More Info
  • B. Latest Tasks
  • C. Learn More
  • D. Quick Links

正解: B

 

質問 16
Which two (2) scan range options are available to an administrator for locating unmanaged endpoints? (Select two)

  • A. IP range within subnet
  • B. IP range within network
  • C. Entire Network
  • D. Entire Subnet
  • E. Subnet Range

正解: B,E

 

質問 17
Which report template includes a summary of risk distribution by devices, users, and groups?

  • A. Comprehensive
  • B. Device Integrity
  • C. Threat Distribution
  • D. Weekly

正解: C

 

質問 18
Which two (2) Discovery and Deploy features could an administrator use to enroll MAC endpoints? (Select two)

  • A. Push Enroll
  • B. A custom Installation package creator pact
  • C. A custom Direct installation package
  • D. Invite User
  • E. A default Direct Installation package

正解: B,C

 

質問 19
Which report template out format should an administrator utilize to generate graphical reports?

  • A. PFD
  • B. XML
  • C. HTML
  • D. XML

正解: C

 

質問 20
Which file should an administrator create, resulting Group Policy Object (GPO)?

  • A. Symantec__Agent_package_x64.zip
  • B. Symantec__Agent_package__32-bit.msi
  • C. Symantec__Agent_package_x64.exe
  • D. Symantec__Agent_package_x64.msi

正解: B

 

質問 21
Which policy should an administrator edit to utilize the Symantec LiveUpdate server for pre-release content?

  • A. The System Policy
  • B. The Firewall Policy
  • C. The System Schedule Policy
  • D. The LiveUpdate Policy

正解: D

 

質問 22
Which term or expression is utilized when adversaries leverage existing tools in the environment?

  • A. file-less attack
  • B. script kiddies
  • C. opportunistic attack
  • D. living off the land

正解: B

 

質問 23
Which SEPM-generated element is required for an administrator to complete the enrollment of SEPM to the cloud console?

  • A. SEPM password
  • B. SQL password
  • C. Token
  • D. Certificate key pair

正解: C

 

質問 24
What does SES's advanced search feature provide when an administrator searches for a specific term?

  • A. A search wizard dialog
  • B. A search summary dialog
  • C. A suggested terms dialog
  • D. A search modifier dialog

正解: D

 

質問 25
What must an administrator check prior to enrolling an on-prem SEPM infrastructure into the cloud?

  • A. Clients are running SEP 12-6 or later
  • B. Clients are running SEP 14.2 or later
  • C. Clients are running SEP 14.1.0 or later
  • D. Clients are running SEP 14.0.1 or late

正解: D

 

質問 26
An administrator needs to create a new Report Template that will be used to track firewall activity. Which two (2) report template settings are optional? (Select 2)

  • A. Generation schedule
  • B. Time frame
  • C. Size restrictions
  • D. Output format
  • E. Email recipients

正解: D,E

 

質問 27
How long does a blacklist task remain in the My Tasks view after its automatic creation?

  • A. 90 Days
  • B. 180 Days
  • C. 60 Days
  • D. 30 Days

正解: D

 

質問 28
Which antimalware intensity level is defined by the following: "Blocks files that are most certainly bad or potentially bad files. Results in a comparable number of false positives and false negatives."

  • A. Level 1
  • B. Level 6
  • C. Level 2
  • D. Level 5

正解: B

 

質問 29
Which Anti-malware technology should an administrator utilize to expose the malicious nature of a file created with a custom packet?

  • A. SONAR
  • B. Reputation
  • C. Sandbox
  • D. Emulator

正解: C

 

質問 30
Which device page should an administrator view to track the progress of an issued device command?

  • A. Activity Update
  • B. Command History
  • C. Recent Activity
  • D. Command Status

正解: C

 

質問 31
Files are blocked by hash in the blacklist policy.
Which algorithm is supported, in addition to MD5?

  • A. MD5 "Salted"
  • B. SHA2
  • C. SHA256
  • D. SHA256 "salted"

正解: C

 

質問 32
Which statement best defines Machine Learning?

  • A. A program that needs user input to perform a task.
  • B. A program that learns from experience to optimize the output of a task.
  • C. A program that teams from observing other programs.
  • D. A program that require data to perform a task.

正解: C

 

質問 33
Which two (2) steps should an administrator take to guard against re-occurring threats? (Select two)

  • A. Use Power Eraser to clean endpoint Windows registries
  • B. Verify that all endpoints receive scheduled Live-Update content
  • C. Add endpoints to a high security group and assign a restrictive Antimalware policy to the group
  • D. Confirm that daily active and weekly full scans take place on all endpoints
  • E. Quarantine affected endpoints

正解: A,E

 

質問 34
Which two (2) options is an administrator able to use to prevent a file from being fasely detected (Select two)

  • A. Reduce the Intensive Protection setting of the Antimalware policy
  • B. Register the file with Symantec's False Positive database
  • C. Add the file to a Whitelist policy
  • D. Rename the file
  • E. Assign the file a SHA-256 cryptographic hash

正解: B,C

 

質問 35
What version number is assigned to a duplicated policy?

  • A. Zero
  • B. The original policy's number plus one
  • C. One
  • D. The original policy's version numb

正解: B

 

質問 36
Which Firewall Stealth setting prevents OS fingerprinting by sending erroneous OS information back to the attacker?

  • A. Disable OS fingerprint profiling
  • B. Enable OS fingerprint protection
  • C. Disable OS fingerprint detection
  • D. Enable OS fingerprint masqueradi

正解: D

 

質問 37
A user downloads and opens a PDF file with Adobe Acrobat. Unknown to the user, a hidden script in the file begins downloading a RAT.
Which Anti-malware engine recognizes that this behavior is inconsistent with normal Acrobat functionality, blocks the behavior and kills Acrobat?

  • A. SONAR
  • B. Sapient
  • C. Emulator
  • D. IPS

正解: B

 

質問 38
What is the primary issue pertaining to managing roaming users while utilizing an on-premise solution?

  • A. The endpoint fails to receive content update
  • B. The endpoint is absent of the management console
  • C. The endpoint is missing timely policy update
  • D. The endpoint is more exposed to threats

正解: A

 

質問 39
......

250-550試験問題集で100%合格率250-550試験:https://www.goshiken.com/Symantec/250-550-mondaishu.html