無料セールまもなく終了!100%有効250-550試験問題集に72問題と解答が待ってます
検証済み250-550問題集と解答であなたを合格確定させるSymantec SCS Certification試験解答!
Symantec 250-550 認定試験の出題範囲:
トピック | 出題範囲 |
---|---|
トピック 1 |
|
トピック 2 |
|
トピック 3 |
|
トピック 4 |
|
トピック 5 |
|
トピック 6 |
|
トピック 7 |
|
トピック 8 |
|
トピック 9 |
|
トピック 10 |
|
トピック 11 |
|
質問 15
Which Security Control dashboard widget should an administrator utilize to access detailed areas for a given security control ?
- A. More Info
- B. Latest Tasks
- C. Learn More
- D. Quick Links
正解: B
質問 16
Which two (2) scan range options are available to an administrator for locating unmanaged endpoints? (Select two)
- A. IP range within subnet
- B. IP range within network
- C. Entire Network
- D. Entire Subnet
- E. Subnet Range
正解: B,E
質問 17
Which report template includes a summary of risk distribution by devices, users, and groups?
- A. Comprehensive
- B. Device Integrity
- C. Threat Distribution
- D. Weekly
正解: C
質問 18
Which two (2) Discovery and Deploy features could an administrator use to enroll MAC endpoints? (Select two)
- A. Push Enroll
- B. A custom Installation package creator pact
- C. A custom Direct installation package
- D. Invite User
- E. A default Direct Installation package
正解: B,C
質問 19
Which report template out format should an administrator utilize to generate graphical reports?
- A. PFD
- B. XML
- C. HTML
- D. XML
正解: C
質問 20
Which file should an administrator create, resulting Group Policy Object (GPO)?
- A. Symantec__Agent_package_x64.zip
- B. Symantec__Agent_package__32-bit.msi
- C. Symantec__Agent_package_x64.exe
- D. Symantec__Agent_package_x64.msi
正解: B
質問 21
Which policy should an administrator edit to utilize the Symantec LiveUpdate server for pre-release content?
- A. The System Policy
- B. The Firewall Policy
- C. The System Schedule Policy
- D. The LiveUpdate Policy
正解: D
質問 22
Which term or expression is utilized when adversaries leverage existing tools in the environment?
- A. file-less attack
- B. script kiddies
- C. opportunistic attack
- D. living off the land
正解: B
質問 23
Which SEPM-generated element is required for an administrator to complete the enrollment of SEPM to the cloud console?
- A. SEPM password
- B. SQL password
- C. Token
- D. Certificate key pair
正解: C
質問 24
What does SES's advanced search feature provide when an administrator searches for a specific term?
- A. A search wizard dialog
- B. A search summary dialog
- C. A suggested terms dialog
- D. A search modifier dialog
正解: D
質問 25
What must an administrator check prior to enrolling an on-prem SEPM infrastructure into the cloud?
- A. Clients are running SEP 12-6 or later
- B. Clients are running SEP 14.2 or later
- C. Clients are running SEP 14.1.0 or later
- D. Clients are running SEP 14.0.1 or late
正解: D
質問 26
An administrator needs to create a new Report Template that will be used to track firewall activity. Which two (2) report template settings are optional? (Select 2)
- A. Generation schedule
- B. Time frame
- C. Size restrictions
- D. Output format
- E. Email recipients
正解: D,E
質問 27
How long does a blacklist task remain in the My Tasks view after its automatic creation?
- A. 90 Days
- B. 180 Days
- C. 60 Days
- D. 30 Days
正解: D
質問 28
Which antimalware intensity level is defined by the following: "Blocks files that are most certainly bad or potentially bad files. Results in a comparable number of false positives and false negatives."
- A. Level 1
- B. Level 6
- C. Level 2
- D. Level 5
正解: B
質問 29
Which Anti-malware technology should an administrator utilize to expose the malicious nature of a file created with a custom packet?
- A. SONAR
- B. Reputation
- C. Sandbox
- D. Emulator
正解: C
質問 30
Which device page should an administrator view to track the progress of an issued device command?
- A. Activity Update
- B. Command History
- C. Recent Activity
- D. Command Status
正解: C
質問 31
Files are blocked by hash in the blacklist policy.
Which algorithm is supported, in addition to MD5?
- A. MD5 "Salted"
- B. SHA2
- C. SHA256
- D. SHA256 "salted"
正解: C
質問 32
Which statement best defines Machine Learning?
- A. A program that needs user input to perform a task.
- B. A program that learns from experience to optimize the output of a task.
- C. A program that teams from observing other programs.
- D. A program that require data to perform a task.
正解: C
質問 33
Which two (2) steps should an administrator take to guard against re-occurring threats? (Select two)
- A. Use Power Eraser to clean endpoint Windows registries
- B. Verify that all endpoints receive scheduled Live-Update content
- C. Add endpoints to a high security group and assign a restrictive Antimalware policy to the group
- D. Confirm that daily active and weekly full scans take place on all endpoints
- E. Quarantine affected endpoints
正解: A,E
質問 34
Which two (2) options is an administrator able to use to prevent a file from being fasely detected (Select two)
- A. Reduce the Intensive Protection setting of the Antimalware policy
- B. Register the file with Symantec's False Positive database
- C. Add the file to a Whitelist policy
- D. Rename the file
- E. Assign the file a SHA-256 cryptographic hash
正解: B,C
質問 35
What version number is assigned to a duplicated policy?
- A. Zero
- B. The original policy's number plus one
- C. One
- D. The original policy's version numb
正解: B
質問 36
Which Firewall Stealth setting prevents OS fingerprinting by sending erroneous OS information back to the attacker?
- A. Disable OS fingerprint profiling
- B. Enable OS fingerprint protection
- C. Disable OS fingerprint detection
- D. Enable OS fingerprint masqueradi
正解: D
質問 37
A user downloads and opens a PDF file with Adobe Acrobat. Unknown to the user, a hidden script in the file begins downloading a RAT.
Which Anti-malware engine recognizes that this behavior is inconsistent with normal Acrobat functionality, blocks the behavior and kills Acrobat?
- A. SONAR
- B. Sapient
- C. Emulator
- D. IPS
正解: B
質問 38
What is the primary issue pertaining to managing roaming users while utilizing an on-premise solution?
- A. The endpoint fails to receive content update
- B. The endpoint is absent of the management console
- C. The endpoint is missing timely policy update
- D. The endpoint is more exposed to threats
正解: A
質問 39
......
250-550試験問題集で100%合格率250-550試験:https://www.goshiken.com/Symantec/250-550-mondaishu.html