[2022年更新]250-550リアルな試験問題集で250-550練習テスト
250-550問題集でSymantec SCS Certification高確率練習問題集
Symantec 250-550 認定試験の出題範囲:
トピック | 出題範囲 |
---|---|
トピック 1 |
|
トピック 2 |
|
トピック 3 |
|
トピック 4 |
|
トピック 5 |
|
トピック 6 |
|
質問 24
In the ICDm, administrators are assisted by the My Task view. Which automation type creates the tasks within the console?
- A. Artificial Intelligence
- B. Advanced Machine Learning
- C. Administrator defined rules
- D. Machine Learning
正解: A
質問 25
Which SES security control protects against threats that may occur in the Impact phase?
- A. Firewall
- B. Antimalware
- C. Device Control
- D. IPS
正解: A
質問 26
What are the Exploit Mitigation security control's mitigation techniques designed to prevent?
- A. Packed file execution
- B. Rootkit downloads
- C. File-less attacks
- D. Misbehaving applications
正解: B
質問 27
Which default role has the most limited permission in the Integrated Cyber Defense Manager?
- A. Restricted Administrator
- B. Limited Administrator
- C. Server Administrator
- D. Endpoint Console Domain Administrator
正解: C
質問 28
Which SES advanced feature detects malware by consulting a training model composed of known good and known bad fries?
- A. Advanced Machine Learning
- B. Reputation
- C. Artificial Intelligence
- D. Signatures
正解: A
質問 29
What should an administrator know regarding the differences between a Domain and a Tenant in ICDm?
- A. A tenant can contain multiple domains
- B. Each customer can have one tenant and many domains
- C. A domain can contain multiple tenants
- D. Each customer can have one domain and many tenant
正解: A
質問 30
What is the frequency of feature updates with SES and the Integrated Cyber Defense Manager (ICDm)
- A. Quarterly
- B. Bi-monthly
- C. Weekly
- D. Monthly
正解: C
質問 31
Which term or expression is utilized when adversaries leverage existing tools in the environment?
- A. file-less attack
- B. script kiddies
- C. opportunistic attack
- D. living off the land
正解: B
質問 32
Which report template type should an administrator utilize to create a daily summary of network threats detected?
- A. Blocked Threats Report
- B. Intrusion Prevention Report
- C. Network Risk Report
- D. Access Violation Report
正解: D
質問 33
Which device page should an administrator view to track the progress of an issued device command?
- A. Activity Update
- B. Command History
- C. Recent Activity
- D. Command Status
正解: C
質問 34
Which security control is complementary to IPS, providing a second layer of protection against network attacks?
- A. Host Integrity
- B. Firewall
- C. Antimalware
- D. Network Protection
正解: D
質問 35
Which technique randomizes the e memory address map with Memory Exploit Mitigation?
- A. ASLR
- B. SEHOP
- C. ForceDEP
- D. ROPHEAP
正解: A
質問 36
Which security threat uses malicious code to destroy evidence, break systems, or encrypt data?
- A. Discovery
- B. Persistence
- C. Execution
- D. Impact
正解: C
質問 37
Which file property does SES utilize to search the VirusTotal website for suspicious file information?
- A. File reputation
- B. File size
- C. File name
- D. File hash
正解: C
質問 38
Which antimalware intensity level is defined by the following: "Blocks files that are most certainly bad or potentially bad files. Results in a comparable number of false positives and false negatives."
- A. Level 1
- B. Level 6
- C. Level 2
- D. Level 5
正解: B
質問 39
Which two (2) scan range options are available to an administrator for locating unmanaged endpoints? (Select two)
- A. IP range within subnet
- B. IP range within network
- C. Entire Network
- D. Entire Subnet
- E. Subnet Range
正解: B,E
質問 40
Which statement best describes Artificial Intelligence?
- A. A program that can predict when a task should be performed
- B. A program that is autonomous and needs training to perform a task
- C. A program that learns from experience and perform autonomous tasks
- D. A program that automates tasks with a static set of instructions
正解: D
質問 41
What are two (2) benefits of a fully cloud managed endpoint protection solution? (Select two)
- A. Reduced 3rd party licensing cost
- B. Reduced network usage
- C. Increased visibility
- D. Increased content update frequency
- E. Reduced database usage
正解: A,E
質問 42
Which SEPM-generated element is required for an administrator to complete the enrollment of SEPM to the cloud console?
- A. SEPM password
- B. SQL password
- C. Token
- D. Certificate key pair
正解: C
質問 43
Which two (2) options is an administrator able to use to prevent a file from being fasely detected (Select two)
- A. Reduce the Intensive Protection setting of the Antimalware policy
- B. Register the file with Symantec's False Positive database
- C. Add the file to a Whitelist policy
- D. Rename the file
- E. Assign the file a SHA-256 cryptographic hash
正解: B,C
質問 44
Which communication method is utilized within SES to achieve real-time management?
- A. Standard polling
- B. Push Notification
- C. Heartbeat
- D. Long polling
正解: B
質問 45
......
250-550リアルな問題と知能問題集:https://www.goshiken.com/Symantec/250-550-mondaishu.html