2022年03月実際に出る250-550試験問題集には正確で更新された問題 [Q41-Q63]

Share

2022年03月実際に出る250-550試験問題集には正確で更新された問題

250-550試験問題集でPDF問題とテストエンジン

質問 41
In which phase of MITRE framework would attackers exploit faults in software to directly tamper with system memory?

  • A. Discovery
  • B. Execution
  • C. Defense Evasion
  • D. Exfiltration

正解: C

 

質問 42
Which security threat uses malicious code to destroy evidence, break systems, or encrypt data?

  • A. Discovery
  • B. Persistence
  • C. Execution
  • D. Impact

正解: C

 

質問 43
An administrator is evaluating an organization's computers for an upcoming SES deployment. Which computer meets the pre-requisites for the SES client?

  • A. A computer running Mac OS X 10.8 with 500 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processor
  • B. A computer running Windows 10 with 400 MB of disk space, 2 GB of RAM, and a 2.4 GHz Intel Pentium 4 processor
  • C. A computer running Mac OS X 10.14 with 400 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processor
  • D. A computer running Windows 8 with 380 MB of disk space, 2 GB of RAM, and a 2.8 GHz Intel Pentium 4 processor

正解: B

 

質問 44
An administrator needs to create a new Report Template that will be used to track firewall activity. Which two (2) report template settings are optional? (Select 2)

  • A. Generation schedule
  • B. Time frame
  • C. Size restrictions
  • D. Output format
  • E. Email recipients

正解: D,E

 

質問 45
Which report template out format should an administrator utilize to generate graphical reports?

  • A. PFD
  • B. XML
  • C. HTML
  • D. XML

正解: C

 

質問 46
What option must an administrator choose when rolling back a policy assignment to a previous version?

  • A. Reverse
  • B. Customize
  • C. Go Back
  • D. Override

正解: D

 

質問 47
Which two (2) Discovery and Deploy features could an administrator use to enroll MAC endpoints? (Select two)

  • A. Push Enroll
  • B. A custom Installation package creator pact
  • C. A custom Direct installation package
  • D. Invite User
  • E. A default Direct Installation package

正解: B,C

 

質問 48
How long does a blacklist task remain in the My Tasks view after its automatic creation?

  • A. 90 Days
  • B. 180 Days
  • C. 60 Days
  • D. 30 Days

正解: D

 

質問 49
Which report template includes a summary of risk distribution by devices, users, and groups?

  • A. Comprehensive
  • B. Device Integrity
  • C. Threat Distribution
  • D. Weekly

正解: C

 

質問 50
Which option should an administrator utilize to temporarily or permanently block a file?

  • A. Blacklist
  • B. Encrypt
  • C. Delete
  • D. Hide

正解: A

 

質問 51
Which file property does SES utilize to search the VirusTotal website for suspicious file information?

  • A. File reputation
  • B. File size
  • C. File name
  • D. File hash

正解: C

 

質問 52
Files are blocked by hash in the blacklist policy.
Which algorithm is supported, in addition to MD5?

  • A. MD5 "Salted"
  • B. SHA2
  • C. SHA256
  • D. SHA256 "salted"

正解: C

 

質問 53
Which two (2) options is an administrator able to use to prevent a file from being fasely detected (Select two)

  • A. Reduce the Intensive Protection setting of the Antimalware policy
  • B. Register the file with Symantec's False Positive database
  • C. Add the file to a Whitelist policy
  • D. Rename the file
  • E. Assign the file a SHA-256 cryptographic hash

正解: B,C

 

質問 54
What is the primary issue pertaining to managing roaming users while utilizing an on-premise solution?

  • A. The endpoint fails to receive content update
  • B. The endpoint is absent of the management console
  • C. The endpoint is missing timely policy update
  • D. The endpoint is more exposed to threats

正解: A

 

質問 55
Which communication method is utilized within SES to achieve real-time management?

  • A. Standard polling
  • B. Push Notification
  • C. Heartbeat
  • D. Long polling

正解: B

 

質問 56
Which two (2) skill areas are critical to the success of incident Response Teams (Select two)

  • A. Project Management
  • B. Incident Management
  • C. Cyber Intelligence
  • D. Threat Analysis
  • E. Incident Response

正解: C,E

 

質問 57
Which SES advanced feature detects malware by consulting a training model composed of known good and known bad fries?

  • A. Advanced Machine Learning
  • B. Reputation
  • C. Artificial Intelligence
  • D. Signatures

正解: A

 

質問 58
Which Anti-malware technology should an administrator utilize to expose the malicious nature of a file created with a custom packet?

  • A. SONAR
  • B. Reputation
  • C. Sandbox
  • D. Emulator

正解: C

 

質問 59
Which Endpoint > Setting should an administrator utilize to locate unmanaged endpoints on a network subnet?

  • A. Device Discovery
  • B. Discover Endpoints
  • C. Endpoint Enrollment
  • D. Discover and Deploy

正解: B

 

質問 60
What does SES's advanced search feature provide when an administrator searches for a specific term?

  • A. A search wizard dialog
  • B. A search summary dialog
  • C. A suggested terms dialog
  • D. A search modifier dialog

正解: D

 

質問 61
What should an administrator know regarding the differences between a Domain and a Tenant in ICDm?

  • A. A tenant can contain multiple domains
  • B. Each customer can have one tenant and many domains
  • C. A domain can contain multiple tenants
  • D. Each customer can have one domain and many tenant

正解: A

 

質問 62
Which device page should an administrator view to track the progress of an issued device command?

  • A. Activity Update
  • B. Command History
  • C. Recent Activity
  • D. Command Status

正解: C

 

質問 63
......


Symantec 250-550 認定試験の出題範囲:

トピック出題範囲
トピック 1
  • Describe device control and how SES can be used to control device access
  • Describe the requirements and process for SEPM integration with the Cyber Defense Manager platform used in SES
トピック 2
  • Describe Advanced Machine Learning and how SES employs this protection to protect endpoints against unknown threats
  • Describe how the Cyber Defense Manager is used to identify threats in an environment
トピック 3
  • Describe threat artifacts and the best practices to follow after a major endpoint security event
  • Describe LiveUpdate functionality and configuration options
トピック 4
  • Describe the network requirements needed for connecting endpoints to the cloud management platform
  • Describe how to utilize console data to identify and endpoints security status
トピック 5
  • Describe IPS and how it is used in detecting and preventing unwanted network traffic
  • Describe the client communication model and how to verify client connectivity
トピック 6
  • Describe false positives, their impact, and how SES can be used to mitigate them
  • Describe how SES can be used to protect endpoints against zero-day attacks
トピック 7
  • Describe the tools and techniques included in SES to adapt security policies based upon threat detections
  • Describe the steps that can be taken to remediate threats locally on an endpoint
トピック 8
  • Describe the SES policy and device groups and how they are used
  • Describe the various types of threats that threaten endpoint devices
トピック 9
  • Describe how to use the SES management console to configure administrative reports
  • Describe SES content update types and how they are distributed to endpoints
トピック 10
  • Describe how content updates can be modified for various network configurations
  • Describe the benefits of adopting a cloud-based endpoint security solution

 

合格させるSymantec 250-550試験最速合格にはGoShiken:https://www.goshiken.com/Symantec/250-550-mondaishu.html