[Q40-Q64] テスト資料250-550テストエンジン試験問題はここにある[2022年03月]

Share

テスト資料250-550テストエンジン試験問題はここにある[2022年03月]

合格突破受験者シミュレーションされた250-550試験PDF問題を試そう

質問 40
Which dashboard should an administrator access to view the current health of the environment?

  • A. The SES Dashboard
  • B. The Antimalware Dashboard
  • C. The Device Integrity Dashboard
  • D. The Security Control Dashboard

正解: D

 

質問 41
What is the frequency of feature updates with SES and the Integrated Cyber Defense Manager (ICDm)

  • A. Quarterly
  • B. Bi-monthly
  • C. Weekly
  • D. Monthly

正解: C

 

質問 42
In which phase of MITRE framework would attackers exploit faults in software to directly tamper with system memory?

  • A. Discovery
  • B. Execution
  • C. Defense Evasion
  • D. Exfiltration

正解: C

 

質問 43
Which IPS Signature type is Primarily used to identify specific unwanted traffic?

  • A. Probe
  • B. Malcode
  • C. Audit
  • D. Attack

正解: D

 

質問 44
What must an administrator check prior to enrolling an on-prem SEPM infrastructure into the cloud?

  • A. Clients are running SEP 12-6 or later
  • B. Clients are running SEP 14.2 or later
  • C. Clients are running SEP 14.1.0 or later
  • D. Clients are running SEP 14.0.1 or late

正解: D

 

質問 45
What should an administrator know regarding the differences between a Domain and a Tenant in ICDm?

  • A. A tenant can contain multiple domains
  • B. Each customer can have one tenant and many domains
  • C. A domain can contain multiple tenants
  • D. Each customer can have one domain and many tenant

正解: A

 

質問 46
An administrator selects the Discovered Items list in the ICDm to investigate a recent surge in suspicious file activity. What should an administrator do to display only high risk files?

  • A. Apply a list control
  • B. Apply a list filter
  • C. Apply a search modifier
  • D. Apply a search rule

正解: D

 

質問 47
Which file should an administrator create, resulting Group Policy Object (GPO)?

  • A. Symantec__Agent_package_x64.zip
  • B. Symantec__Agent_package__32-bit.msi
  • C. Symantec__Agent_package_x64.exe
  • D. Symantec__Agent_package_x64.msi

正解: B

 

質問 48
Which Security Control dashboard widget should an administrator utilize to access detailed areas for a given security control ?

  • A. More Info
  • B. Latest Tasks
  • C. Learn More
  • D. Quick Links

正解: B

 

質問 49
Files are blocked by hash in the blacklist policy.
Which algorithm is supported, in addition to MD5?

  • A. MD5 "Salted"
  • B. SHA2
  • C. SHA256
  • D. SHA256 "salted"

正解: C

 

質問 50
In the ICDm, administrators are assisted by the My Task view. Which automation type creates the tasks within the console?

  • A. Artificial Intelligence
  • B. Advanced Machine Learning
  • C. Administrator defined rules
  • D. Machine Learning

正解: A

 

質問 51
An endpoint is offline, and the administrator issues a scan command. What happens to the endpoint when it restarts, if it lacks connectivity?

  • A. The system scans after the content update is downloaded.
  • B. The system downloads the content without scanning.
  • C. The system starts without scanning.
  • D. The system is scanning when started.

正解: B

 

質問 52
Which SES advanced feature detects malware by consulting a training model composed of known good and known bad fries?

  • A. Advanced Machine Learning
  • B. Reputation
  • C. Artificial Intelligence
  • D. Signatures

正解: A

 

質問 53
Wh.ch Firewall rule components should an administrator configure to block facebook.com use during business hours?

  • A. Action, Hosts(s), and Schedule
  • B. Action, Application, and Schedule
  • C. Application, Host(s), and Network Service
  • D. Host(s), Network Interface, and Network Service

正解: A

 

質問 54
Which designation should an administrator assign to the computer configured to find unmanaged devices?

  • A. Discovery Agent
  • B. Discovery Broker
  • C. Discovery Device
  • D. Discovery Manager

正解: A

 

質問 55
What version number is assigned to a duplicated policy?

  • A. Zero
  • B. The original policy's number plus one
  • C. One
  • D. The original policy's version numb

正解: B

 

質問 56
Why would an administrator choose the Server-optimized installation option when creating an installation package?

  • A. To add the SES client's Optimize Memory setting to the default server installation.
  • B. To reduce the SES client's using resources that are required for other server-specific processes.
  • C. To limit the Intrusion Prevention policy to use server-only signatures.
  • D. To add the Server-optimized Firewall policy

正解: C

 

質問 57
An administrator must create a custom role in ICDm.
Which area of the management console is able to have access restricted or granted?

  • A. Agent deployment
  • B. Hybrid device management
  • C. Policy Management
  • D. Custom Dashboard Creation

正解: A

 

質問 58
Which alert rule category includes events that are generated about the cloud console?

  • A. Application Activity
  • B. Security
  • C. System
  • D. Diagnostic

正解: B

 

質問 59
Which statement best defines Machine Learning?

  • A. A program that needs user input to perform a task.
  • B. A program that learns from experience to optimize the output of a task.
  • C. A program that teams from observing other programs.
  • D. A program that require data to perform a task.

正解: C

 

質問 60
What is the primary issue pertaining to managing roaming users while utilizing an on-premise solution?

  • A. The endpoint fails to receive content update
  • B. The endpoint is absent of the management console
  • C. The endpoint is missing timely policy update
  • D. The endpoint is more exposed to threats

正解: A

 

質問 61
Which Endpoint > Setting should an administrator utilize to locate unmanaged endpoints on a network subnet?

  • A. Device Discovery
  • B. Discover Endpoints
  • C. Endpoint Enrollment
  • D. Discover and Deploy

正解: B

 

質問 62
An administrator suspects that several computers have become part of a botnet. What should the administrator do to detect botnet activity on the network?

  • A. Add botnet related signatures to the IPS policy's Audit Signatures list
  • B. Enable the IPS policy's Show notification on the device setting
  • C. Enable the Command and Control Server Firewall
  • D. Set the Antimalware policy's Monitoring Level to 4

正解: C

 

質問 63
Which Antimalware technology is used after all local resources have been exhausted?

  • A. ITCS
  • B. Reputation
  • C. Sapient
  • D. Emulator

正解: A

 

質問 64
......


Symantec 250-550 認定試験の出題範囲:

トピック出題範囲
トピック 1
  • 誤検知、その影響、およびSESを使用してそれらを軽減する方法を説明する
  • ゼロデイ攻撃からエンドポイントを保護するためにSESを使用する方法を説明する
トピック 2
  • 脅威のアーティファクトと主要なエンドポイントセキュリティイベントの後に従うべきベストプラクティスを説明する
  • LiveUpdateの機能と構成オプションを説明する
トピック 3
  • IPSと、不要なネットワークトラフィックの検出と防止にIPSがどのように使用されるかを説明します
  • クライアント通信モデルとクライアント接続を確認する方法を説明します
トピック 4
  • 高度な機械学習と、SESがこの保護を使用してエンドポイントを未知の脅威から保護する方法を説明します
  • Cyber​​ DefenseManagerを使用して環境内の脅威を特定する方法を説明します
トピック 5
  • 管理されていないエンドポイントを識別するためにSESが使用するさまざまな方法を説明する
  • さまざまなメモリエクスプロイト軽減手法とSESがそれらから保護する方法を説明する
トピック 6
  • SES管理コンソールを使用して管理レポートを構成する方法を説明する
  • SESコンテンツの更新タイプとそれらをエンドポイントに配布する方法を説明する
トピック 7
  • SESシステム要件とサポートされているオペレーティングシステムについて説明する
  • SESで利用可能なアカウントアクセスと認証方法について説明する
トピック 8
  • 脅威の検出に基づいてセキュリティポリシーを適応させるためにSESに含まれているツールと手法を説明する
  • エンドポイントでローカルに脅威を修正するために実行できる手順を説明する
トピック 9
  • さまざまなネットワーク構成に合わせてコンテンツの更新を変更する方法を説明する
  • クラウドベースのエンドポイントセキュリティソリューションを採用する利点を説明する

 

正真正銘で最適な250-550オンライン練習試験資料:https://www.goshiken.com/Symantec/250-550-mondaishu.html