[2022年更新]250-550リアルな試験問題集で250-550練習テスト [Q24-Q45]

Share

[2022年更新]250-550リアルな試験問題集で250-550練習テスト

250-550問題集でSymantec SCS Certification高確率練習問題集


Symantec 250-550 認定試験の出題範囲:

トピック出題範囲
トピック 1
  • Describe the SES policy and device groups and how they are used
  • Describe the various types of threats that threaten endpoint devices
トピック 2
  • Describe the network requirements needed for connecting endpoints to the cloud management platform
  • Describe how to utilize console data to identify and endpoints security status
トピック 3
  • Describe device control and how SES can be used to control device access
  • Describe the requirements and process for SEPM integration with the Cyber Defense Manager platform used in SES
トピック 4
  • Describe the various methods SES uses to identify unmanaged endpoints
  • Describe various Memory Exploit Mitigation techniques and how SES protects against them
トピック 5
  • Describe how content updates can be modified for various network configurations
  • Describe the benefits of adopting a cloud-based endpoint security solution
トピック 6
  • Describe how to use the SES management console to configure administrative reports
  • Describe SES content update types and how they are distributed to endpoints

 

質問 24
In the ICDm, administrators are assisted by the My Task view. Which automation type creates the tasks within the console?

  • A. Artificial Intelligence
  • B. Advanced Machine Learning
  • C. Administrator defined rules
  • D. Machine Learning

正解: A

 

質問 25
Which SES security control protects against threats that may occur in the Impact phase?

  • A. Firewall
  • B. Antimalware
  • C. Device Control
  • D. IPS

正解: A

 

質問 26
What are the Exploit Mitigation security control's mitigation techniques designed to prevent?

  • A. Packed file execution
  • B. Rootkit downloads
  • C. File-less attacks
  • D. Misbehaving applications

正解: B

 

質問 27
Which default role has the most limited permission in the Integrated Cyber Defense Manager?

  • A. Restricted Administrator
  • B. Limited Administrator
  • C. Server Administrator
  • D. Endpoint Console Domain Administrator

正解: C

 

質問 28
Which SES advanced feature detects malware by consulting a training model composed of known good and known bad fries?

  • A. Advanced Machine Learning
  • B. Reputation
  • C. Artificial Intelligence
  • D. Signatures

正解: A

 

質問 29
What should an administrator know regarding the differences between a Domain and a Tenant in ICDm?

  • A. A tenant can contain multiple domains
  • B. Each customer can have one tenant and many domains
  • C. A domain can contain multiple tenants
  • D. Each customer can have one domain and many tenant

正解: A

 

質問 30
What is the frequency of feature updates with SES and the Integrated Cyber Defense Manager (ICDm)

  • A. Quarterly
  • B. Bi-monthly
  • C. Weekly
  • D. Monthly

正解: C

 

質問 31
Which term or expression is utilized when adversaries leverage existing tools in the environment?

  • A. file-less attack
  • B. script kiddies
  • C. opportunistic attack
  • D. living off the land

正解: B

 

質問 32
Which report template type should an administrator utilize to create a daily summary of network threats detected?

  • A. Blocked Threats Report
  • B. Intrusion Prevention Report
  • C. Network Risk Report
  • D. Access Violation Report

正解: D

 

質問 33
Which device page should an administrator view to track the progress of an issued device command?

  • A. Activity Update
  • B. Command History
  • C. Recent Activity
  • D. Command Status

正解: C

 

質問 34
Which security control is complementary to IPS, providing a second layer of protection against network attacks?

  • A. Host Integrity
  • B. Firewall
  • C. Antimalware
  • D. Network Protection

正解: D

 

質問 35
Which technique randomizes the e memory address map with Memory Exploit Mitigation?

  • A. ASLR
  • B. SEHOP
  • C. ForceDEP
  • D. ROPHEAP

正解: A

 

質問 36
Which security threat uses malicious code to destroy evidence, break systems, or encrypt data?

  • A. Discovery
  • B. Persistence
  • C. Execution
  • D. Impact

正解: C

 

質問 37
Which file property does SES utilize to search the VirusTotal website for suspicious file information?

  • A. File reputation
  • B. File size
  • C. File name
  • D. File hash

正解: C

 

質問 38
Which antimalware intensity level is defined by the following: "Blocks files that are most certainly bad or potentially bad files. Results in a comparable number of false positives and false negatives."

  • A. Level 1
  • B. Level 6
  • C. Level 2
  • D. Level 5

正解: B

 

質問 39
Which two (2) scan range options are available to an administrator for locating unmanaged endpoints? (Select two)

  • A. IP range within subnet
  • B. IP range within network
  • C. Entire Network
  • D. Entire Subnet
  • E. Subnet Range

正解: B,E

 

質問 40
Which statement best describes Artificial Intelligence?

  • A. A program that can predict when a task should be performed
  • B. A program that is autonomous and needs training to perform a task
  • C. A program that learns from experience and perform autonomous tasks
  • D. A program that automates tasks with a static set of instructions

正解: D

 

質問 41
What are two (2) benefits of a fully cloud managed endpoint protection solution? (Select two)

  • A. Reduced 3rd party licensing cost
  • B. Reduced network usage
  • C. Increased visibility
  • D. Increased content update frequency
  • E. Reduced database usage

正解: A,E

 

質問 42
Which SEPM-generated element is required for an administrator to complete the enrollment of SEPM to the cloud console?

  • A. SEPM password
  • B. SQL password
  • C. Token
  • D. Certificate key pair

正解: C

 

質問 43
Which two (2) options is an administrator able to use to prevent a file from being fasely detected (Select two)

  • A. Reduce the Intensive Protection setting of the Antimalware policy
  • B. Register the file with Symantec's False Positive database
  • C. Add the file to a Whitelist policy
  • D. Rename the file
  • E. Assign the file a SHA-256 cryptographic hash

正解: B,C

 

質問 44
Which communication method is utilized within SES to achieve real-time management?

  • A. Standard polling
  • B. Push Notification
  • C. Heartbeat
  • D. Long polling

正解: B

 

質問 45
......

250-550リアルな問題と知能問題集:https://www.goshiken.com/Symantec/250-550-mondaishu.html