2022年03月実際に出る250-550試験問題集には正確で更新された問題
250-550試験問題集でPDF問題とテストエンジン
質問 41
In which phase of MITRE framework would attackers exploit faults in software to directly tamper with system memory?
- A. Discovery
- B. Execution
- C. Defense Evasion
- D. Exfiltration
正解: C
質問 42
Which security threat uses malicious code to destroy evidence, break systems, or encrypt data?
- A. Discovery
- B. Persistence
- C. Execution
- D. Impact
正解: C
質問 43
An administrator is evaluating an organization's computers for an upcoming SES deployment. Which computer meets the pre-requisites for the SES client?
- A. A computer running Mac OS X 10.8 with 500 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processor
- B. A computer running Windows 10 with 400 MB of disk space, 2 GB of RAM, and a 2.4 GHz Intel Pentium 4 processor
- C. A computer running Mac OS X 10.14 with 400 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processor
- D. A computer running Windows 8 with 380 MB of disk space, 2 GB of RAM, and a 2.8 GHz Intel Pentium 4 processor
正解: B
質問 44
An administrator needs to create a new Report Template that will be used to track firewall activity. Which two (2) report template settings are optional? (Select 2)
- A. Generation schedule
- B. Time frame
- C. Size restrictions
- D. Output format
- E. Email recipients
正解: D,E
質問 45
Which report template out format should an administrator utilize to generate graphical reports?
- A. PFD
- B. XML
- C. HTML
- D. XML
正解: C
質問 46
What option must an administrator choose when rolling back a policy assignment to a previous version?
- A. Reverse
- B. Customize
- C. Go Back
- D. Override
正解: D
質問 47
Which two (2) Discovery and Deploy features could an administrator use to enroll MAC endpoints? (Select two)
- A. Push Enroll
- B. A custom Installation package creator pact
- C. A custom Direct installation package
- D. Invite User
- E. A default Direct Installation package
正解: B,C
質問 48
How long does a blacklist task remain in the My Tasks view after its automatic creation?
- A. 90 Days
- B. 180 Days
- C. 60 Days
- D. 30 Days
正解: D
質問 49
Which report template includes a summary of risk distribution by devices, users, and groups?
- A. Comprehensive
- B. Device Integrity
- C. Threat Distribution
- D. Weekly
正解: C
質問 50
Which option should an administrator utilize to temporarily or permanently block a file?
- A. Blacklist
- B. Encrypt
- C. Delete
- D. Hide
正解: A
質問 51
Which file property does SES utilize to search the VirusTotal website for suspicious file information?
- A. File reputation
- B. File size
- C. File name
- D. File hash
正解: C
質問 52
Files are blocked by hash in the blacklist policy.
Which algorithm is supported, in addition to MD5?
- A. MD5 "Salted"
- B. SHA2
- C. SHA256
- D. SHA256 "salted"
正解: C
質問 53
Which two (2) options is an administrator able to use to prevent a file from being fasely detected (Select two)
- A. Reduce the Intensive Protection setting of the Antimalware policy
- B. Register the file with Symantec's False Positive database
- C. Add the file to a Whitelist policy
- D. Rename the file
- E. Assign the file a SHA-256 cryptographic hash
正解: B,C
質問 54
What is the primary issue pertaining to managing roaming users while utilizing an on-premise solution?
- A. The endpoint fails to receive content update
- B. The endpoint is absent of the management console
- C. The endpoint is missing timely policy update
- D. The endpoint is more exposed to threats
正解: A
質問 55
Which communication method is utilized within SES to achieve real-time management?
- A. Standard polling
- B. Push Notification
- C. Heartbeat
- D. Long polling
正解: B
質問 56
Which two (2) skill areas are critical to the success of incident Response Teams (Select two)
- A. Project Management
- B. Incident Management
- C. Cyber Intelligence
- D. Threat Analysis
- E. Incident Response
正解: C,E
質問 57
Which SES advanced feature detects malware by consulting a training model composed of known good and known bad fries?
- A. Advanced Machine Learning
- B. Reputation
- C. Artificial Intelligence
- D. Signatures
正解: A
質問 58
Which Anti-malware technology should an administrator utilize to expose the malicious nature of a file created with a custom packet?
- A. SONAR
- B. Reputation
- C. Sandbox
- D. Emulator
正解: C
質問 59
Which Endpoint > Setting should an administrator utilize to locate unmanaged endpoints on a network subnet?
- A. Device Discovery
- B. Discover Endpoints
- C. Endpoint Enrollment
- D. Discover and Deploy
正解: B
質問 60
What does SES's advanced search feature provide when an administrator searches for a specific term?
- A. A search wizard dialog
- B. A search summary dialog
- C. A suggested terms dialog
- D. A search modifier dialog
正解: D
質問 61
What should an administrator know regarding the differences between a Domain and a Tenant in ICDm?
- A. A tenant can contain multiple domains
- B. Each customer can have one tenant and many domains
- C. A domain can contain multiple tenants
- D. Each customer can have one domain and many tenant
正解: A
質問 62
Which device page should an administrator view to track the progress of an issued device command?
- A. Activity Update
- B. Command History
- C. Recent Activity
- D. Command Status
正解: C
質問 63
......
Symantec 250-550 認定試験の出題範囲:
トピック | 出題範囲 |
---|---|
トピック 1 |
|
トピック 2 |
|
トピック 3 |
|
トピック 4 |
|
トピック 5 |
|
トピック 6 |
|
トピック 7 |
|
トピック 8 |
|
トピック 9 |
|
トピック 10 |
|
合格させるSymantec 250-550試験最速合格にはGoShiken:https://www.goshiken.com/Symantec/250-550-mondaishu.html