A) Exfiltration
B) Incursion
C) Discovery
D) Capture
Correct Answer
verified
Multiple Choice
A) Create a unique Cynic account to provide to ATP
B) Create a unique Symantec Messaging Gateway account to provide to ATP
C) Create a unique Symantec Endpoint Protection Manager (SEPM) administrator account to provide to ATP
D) Create a unique Email Security.cloud portal account to provide to ATP
Correct Answer
verified
Multiple Choice
A) NTLM
B) Surrogate credentials
C) Kerberos
D) Basic
Correct Answer
verified
Multiple Choice
A) Use the isolate command in ATP to move all endpoints to a quarantine network.
B) Blacklist suspicious domains in the ATP manager.
C) Deploy a High-Security Antivirus and Antispyware policy in the Symantec Endpoint Protection Manager (SEPM) .
D) Create a firewall rule in the Symantec Endpoint Protection Manager (SEPM) or perimeter firewall that blocks traffic to the domain.
E) Run a full system scan on all endpoints.
Correct Answer
verified
Multiple Choice
A) Anti-Malware
B) Anti-Spam
C) Data Protection
D) Email Impersonation Control
Correct Answer
verified
Multiple Choice
A) 10 megabytes
B) 15 megabytes
C) 20 megabytes
D) 25 megabytes
Correct Answer
verified
Multiple Choice
A) Remove the snapshot from the associated volume.
B) Recursively remove all plexes and subdisks.
C) Disassociate the snapshot from the associated volume.
D) Unmount the file system.
Correct Answer
verified
Multiple Choice
A) An on-premises sandbox tool
B) A cloud sandbox tool
C) An on-premises signature based tool
D) A cloud signature based tool
Correct Answer
verified
Multiple Choice
A) The ProxySG stops further processing in the layer containing the rule.
B) The ProxySG continues processing to see whether a further rule might negate the first rule.
C) It depends on the default policy configured.
D) The ProxySG stops further processing and executes the rule.
Correct Answer
verified
Multiple Choice
A) Unmirror and unencapsulate the disk group.
B) Import the disk group and rename it on Srv2.
C) Import the disk group on Srv2 as is.
D) Rename the disk group during deport operation.
Correct Answer
verified
Multiple Choice
A) Reputation-based security
B) Event correlation
C) Network detection component
D) Detonation/sandbox
Correct Answer
verified
Multiple Choice
A) On the server that is to be the Notification Server to create an offline installation if this Notification Server has no internet access
B) On another server to remotely install it on the target Notification Server
C) On the server that is to be the Notification Server
D) It should be installed on a desktop class system to remotely install it on the target Notification Server
E) On another computer to create an offline installation package if the Notification Server has no internet access
Correct Answer
verified
Multiple Choice
A) Client in, server out, server in, client out
B) Client in, server out, client out, server in
C) Client in, server in, client out, server out
D) Client in, server in, server out, client out
Correct Answer
verified
Multiple Choice
A) Throughput
B) Bandwidth
C) Link speed
D) Number of users
Correct Answer
verified
Multiple Choice
A) Tag the subject line
B) Copy to administrator
C) Quarantine the message
D) Log only
Correct Answer
verified
Multiple Choice
A) Notification Server and Symantec Management Agent
B) Symantec Management Console and Internet Gateway
C) Symantec Management Console and Symantec Management Agent
D) Notification Server and Internet Gateway
Correct Answer
verified
Multiple Choice
A) Does the organization need to do a healthcheck in the environment?
B) Are certain endpoints being repeatedly attacked?
C) Is the organization being attacked by this external entity repeatedly?
D) Do ports need to be blocked or opened on the firewall?
E) Does a risk assessment need to happen in the environment?
Correct Answer
verified
Multiple Choice
A) assign the policy group to the scan target
B) choose the correct policy in the scan target
C) assign the policy to the Network Discover Server
D) choose the correct scan target in the policy destination
Correct Answer
verified
Multiple Choice
A) 20
B) 443
C) 80
D) 43
Correct Answer
verified
Multiple Choice
A) Altiris Perfmon
B) Altiris Profiler
C) Altiris Event Viewer
D) Altiris Log Viewer
Correct Answer
verified
Showing 341 - 360 of 409
Related Exams