Перейти к содержанию
YuraG

Помогите по вопросам!

Recommended Posts

YuraG

Помогите с этими вопросами очень нужно !!!!!!!

1

Which two do you need in order to add a Replication Partner? (Select two.)

local domain user and password

local domain administrator name and password

replication server name and port

administrator name and password

2

An administrator moves a managed client to a new group with a specific Application and Device control policy assigned to it.

Which statement is true?

The policy is automatically applied to the client, without further administrator action.

The administrator must ensure that LiveUpdate runs on the managed client.

In the Clients page, the administrator must right-click the group and click "Sync now."

In the Policies page, the administrator must click the Device and Application policy and click "Assign."

3

Which two statements describe the interactions between Symantec Endpoint Protection 11.0 and Quarantine Server? (Select two.)

Clients upload log data to Symantec Endpoint Protection Manager and upload quarantined files to Quarantine Server.

Clients upload log data and quarantined files to the Quarantine Server, which forwards the log data to the Symantec Endpoint Protection Manager.

Symantec Endpoint Protection Manager sends quarantine policies, which define the location of the Quarantine Server, to managed clients.

Clients upload log data and quarantined files to Symantec Endpoint Protection Manager, which forwards the files to the Quarantine Server.

The Quarantine Server sends its location and quarantine policies and rules to all clients.

4

In which two modes can Symantec Endpoint Protection clients be configured? (Select two.)

Groups

Users

Locations

Computers

5

To which two areas can you apply Symantec Endpoint Protection firewall policies? (Select two.)

Groups

Databases

Locations

Devices

6

Which four events trigger an Auto-Protect scan? (Select four.)

open

archive

move

create

rename

run

7

Which tool is used to reconfigure the port number for the external Microsoft SQL database?

Migration and Deployment Wizard

Management Server Configuration Wizard

Database Back Up and Restore Wizard

Symantec Endpoint Protection Management console

8

When using the Push Deployment Wizard, which two methods can you use to identify the target machines to which you want to install the Symantec Endpoint Protection client? (Select two.)

specify a UNC path

import a file containing IP addresses

import hostnames from an LDAP server

import a file containing MAC addresses

browse through Windows Networking

9

What are two reasons for installing multiple Symantec Endpoint Protection Managers in any given deployment? (Select two.)

load balancing

quarantine collection

failover

ease of management

10

Which section of the Symantec Endpoint Protection console provides real time network information for an administrator?

Monitors

Reports

Admin

Clients

11

What are three features of Symantec Endpoint Protection 11.0? (Select three.)

Intrusion Prevention

Application and Device Control

Client Firewall

Application Performance Management

Endpoint Change Control

12

Which setting would an administrator modify to increase application performance during system scans?

tuning options

encrypted connections

tamper protection

scan frequency

13

Which three triggers can you use for Symantec Endpoint Protection firewall rules? (Select three.)

Application

Network Service

DHCP Address

Registry Key

Host

14

From which two pages can you enable custom Intrusion Prevention for a client group in the Symantec Endpoint Protection Manager console? (Select two.)

Clients

Policies

Monitor

Admin

15

Which two actions can Application / Device Control perform? (Select two.)

provides content filtering

prevents specific processes from executing

blocks unapproved devices

notifies the user of compliance policies

16

Which two exclusions can the Centralized Exception policy perform? (Select two.)

exclude a specific folder from AntiVirus and AntiSpyware File System Auto-Protect scanning

exclude forwarding of certain log types from the Symantec Endpoint Protection client

specify machines from which the Symantec Endpoint Protection Manager console cannot be run

specify an exclusion to keep a known risk from being scanned

17

Which two sections on the Symantec Endpoint Protection client interface provide troubleshooting information, such as management server, policy serial number, and location? (Select two.)

Status

View Logs

Change Settings

Help and Support

18

What are two ways that the Find Unmanaged Computers feature searches for unmanaged computers? (Select two.)

by computer name

by MAC address

by IP address

by LDAP user

19

From which page can you enable Custom Intrusion Prevention for a client group in the Symantec Endpoint Protection Manager console?

Clients

Monitors

Admin

Policies

20

In which policy can you prevent clients from getting Proactive Threat Scan updates?

Application and Device Blocking

Antivirus and Antispyware

LiveUpdate Content

Intrusion Prevention

21

What are two preferences that you can configure on the Home page? (Select two.)

links to company-specific intranet sites

threshholds for the "Security Status"

color for graphical charts

favorite reports

22

A company is interested in making sure that their remote VPN users have compliant systems before joining the corporate network.

Which two Symantec Network Access Control methods are recommended? (Select two.)

Self Enforcement

Gateway Enforcer

DHCP Enforcer

LAN Enforcer

23

When should you use the Find Unmanaged Computer feature rather than the Unmanaged Detector feature?

to receive a notification about unmanaged computers

to immediately deploy a client package to unmanaged computers

to place unmanaged computers in a virtual subnet

to run a shutdown command on unmanaged computers

24

An administrator adds a directory server to the Symantec Endpoint Protection Manager. The administrator then creates a new administrator account named "johndoe" in Symantec Endpoint Protection Manager. The "johndoe" account is configured to log on using directory authentication.

When logging on as "johndoe", what password should should be used?

the password associated with the "johndoe" user in the Symantec Endpoint Protection Manager

the password associated with the directory server account mapped to the "johndoe" user

the password associated with the directory server domain administrator account

the password associated with the default local administrator accoun

25

Which settings do policies in newly created groups contain by default?

settings from the temporary group

default settings

settings from the parent group

undefined settings

26

What are three types of Auto-Protect scans? (Select three.)

port detection scans

file system scans

Internet mail message scans

e-mail attachment scans

new device scans

27

Which two are optional when replicating between Symantec Endpoint Protection Managers? (Select two.)

policies

content

logs

groups

28

Which client communication mode provides a constant connection to the Symantec Endpoint Protection Manager?

Get Mode

Push Mode

Pull Mode

Put Mode

29

Which two statements are true about Symantec Network Access Control? (Select two.)

It is integrated into and included with Symantec Endpoint Protection 11.0, but requires an additional license to enable the network access control features.

It is on the roadmap to be integrated with Symantec Endpoint Protection 11.0 in a future maintenance pack release.

It is partially integrated into Symantec Endpoint Protection 11.0, with a shared management console and compatible clients.

It is integrated into Symantec Endpoint Protection 11.0, with a shared management console and a single shared client.

It is not integrated with Symantec Endpoint Protection 11.0, although both clients may be installed on any supported host without any operational issues.

30

What must you do to use Symantec AntiVirus reporting server data in a Symantec Endpoint Protection environment?

You must install Symantec Endpoint Protection reporting connector on the existing reporting server.

You must configure existing reporting servers to forward reports to an external Syslog server.

You must configure existing reporting servers to forward reports to Symantec Endpoint Protection Manager.

You must upgrade the existing reporting server to Symantec Endpoint Protection Manager reporting server.

31

On the Client page, which two settings can you modify at the group level? (Select two.)

client log settings

communication settings

delete client settings

hardware settings

Заранее очень благодарен

Поделиться сообщением


Ссылка на сообщение
Поделиться на другие сайты
Zilla

Халявы захотелось? :) Лучше погуглите, наверняка где-то эти вопросы тоже обсуждаются, на англоязычных порталах..

Поделиться сообщением


Ссылка на сообщение
Поделиться на другие сайты
Кирилл Керценбаум

YuraG ответы на все вопросы есть в Документации по продукту, сдаете Тест - сдавайте его честно

ТЕМА ЗАКРЫТА

Поделиться сообщением


Ссылка на сообщение
Поделиться на другие сайты
Гость
Эта тема закрыта для публикации ответов.

  • Сообщения

    • Ego Dekker
      Антивирусы для macOS были обновлены до версии 6.10.700.
    • ForetFR
      CLIMB Hearsay from Earth - https://mebonus.ru
      Google №Wet

      Palestinians scoot as Israel bombards haunts from style, swell and sod!!!

      Google Hearsay

      People in Gaza fled their homes carrying crying children and valued possessions as Israeli forces pounded the vicinage from aura, adrift and land on Friday.
      The escalating controversy triggered furious protests in the occupied West Bank, where seven Palestinians were killed by way of Israeli army fire, and moreover fury between Arabs and Jews in Israel.
      Hamas praised the clashes between stone-throwing youths and Israeli soldiers in the West Bank grevorgАЛИdVhower , m‚tier on Palestinians to “set the ground ablaze under the feet of the rule”.
      Google RUMOUR - Wet
      In a meritorious escalation in the worst bout of fighting between Israel and Hamas looking for seven years, oppressive artillery fire was aimed at what the Israeli military said was a hefty network of fighter tunnels. Dozens of Hamas operatives were killed in the strikes, the Israel Apologia Forces (IDF) said.
      Palestinian protesters burn tyres and throw stones at Israeli forces in the West Bank community of Nablus

      There was gallimaufry overnight after the IDF corrected an earlier communiqu‚ saying that base troops were “currently attacking in the Gaza Strip”. A blemished proclamation clarified that there was no excuse sediment aggression, but artillery and tank vivacity from the border. “Clarification: there are currently no IDF establish troops reversed the Gaza Strip. IDF current and area forces are carrying out strikes on targets in the Gaza Strip,” it said.
      What is the current Israel-Gaza turning-point far and where is it heading?
      Deliver assign to more - GOOD COPY - in cak

      Analysts suggested it was a purposeful ploy intended to onwards elder Hamas figures to split for into a network of hidden tunnels known as “the metro”. Israeli forces later targeted the tunnels, which were built after the 2014 war.
      An IDF asseveration said 160 aircraft had “struck over 150 subterranean targets in the northern Gaza Shed one's clothes” overnight. Israel’s forces destroyed “many kilometres” of the tunnels during the assail, it claimed.
      A multi-storey building casing a bank affiliated with Hamas was destroyed, and weapons opus and naval sites were also smash, it said.

      Palestinians living in areas closed to the Gaza-Israel frieze fled their homes in pickup trucks, on donkeys and on foot. Some went to UN-run schools in Gaza Urban district, carrying small children, household essentials and food.
      Hedaia Maarouf, who left-wing her serene with her extended kinfolk of 19 people, including 13 children, said: “We were terrified instead of our children, who were screaming and shaking.”
      A Palestinian kindred flees their home in Beit Lahya in the northern Gaza Strip?
      In northern Gaza, Rafat Tanani, his having a bun in the oven strife and four children were killed after an Israeli warplane reduced a building to rubble, residents said.
      Bill - Matt Gaetz associate pleads contrite to sexual congress trafficking crimes – US manipulation animate Bouts

      The death chime in Gaza rose to over and above 120, with a dressy increase in the number of people injured in the overnight onslaught, according to the Gaza health ministry. At least 31 children bear been killed.
      Hospitals that were already struggling to wine patients with Covid received an influx of people with shrapnel wounds and other injuries. Some needed amputations. “All I can do is beseech,” said one hospital director.
      The UN said more than 200 homes and 24 schools in Gaza had been destroyed or severely damaged in Israeli bearing raids in the lifestyle five days. It also said residents’ access to inexperienced spa water could be limited because of power cuts and harm to pipe networks.
      Increased power blackouts are expected as nuclear fuel supplies off low. Most families already exclusively have power in regard to four or five hours a daylight, and hospitals are stiff to rely on generators.

      Hamas and other militant groups continued to fusillade rockets into Israel, where example sirens sounded in towns and communities. The Israeli military said it had intercepted at least five drones carrying explosives launched from Gaza since Thursday.
      Read more Scandal - HEARSAY - in Wet

      Statistic Tidings Front-page news
      http://mebonus.ru - Front-page news of Googles
    • кустомер
      Всем здравствуйте. СРАЗУ оговорка:
      Кнопка "Создать новую тему" только на главной странице форума.
      В выпадающем её меню НЕактивны абсолютно все разделы кроме этого.
      Тему разместить хотелось-бы в другом разделе.
      Ответ на тот вопрос ― наверное поэтому.
      Собственно по делу -
      У кого из считающих себя "мастером_своего_дела" могло-бы появиться желание
      подумать и высказать своё предположение метода проникновения файла сценария
      с печеньями (cookies) после того, как весь IP-диапазон адреса хранения файла
      был заблокирован в настройках Outpost, отлично справляющегося по сей день
      с блокировкой ЛЮБЫХ других (кроме этого) IP-диапазонов? Адрес(имя) файла:
      https://mc.yandex.ru/metrika/watch.js Outpost навскидку можно сравнить с другими продуктами защиты - там.

      Вопросы типа "а-зачем-вам-это-надо" будут
      расценены как флуд, отвлекающий от темы. (уважаэмым модераторам)
      Тема относится к способу проникновения этой заразы, а не к конкретному продукту защиты.
    • demkd
      на него уже давно не реагируют они сейчас самый опасный report_crash что дампы отправляет  
    • akoK
×