最新のSymantec 250-550試験問題解答がズラリ [Q18-Q42]

Share

最新のSymantec 250-550試験問題解答がズラリ

250-550試験練習テスト問題(更新された72問あります)


Symantec 250-550 認定試験の出題範囲:

トピック出題範囲
トピック 1
  • SES管理コンソールを使用して管理レポートを構成する方法を説明する
  • SESコンテンツの更新タイプとそれらをエンドポイントに配布する方法を説明する
トピック 2
  • さまざまなネットワーク構成に合わせてコンテンツの更新を変更する方法を説明する
  • クラウドベースのエンドポイントセキュリティソリューションを採用する利点を説明する
トピック 3
  • 高度な機械学習と、SESがこの保護を使用してエンドポイントを未知の脅威から保護する方法を説明します
  • Cyber​​ DefenseManagerを使用して環境内の脅威を特定する方法を説明します
トピック 4
  • SESシステム要件とサポートされているオペレーティングシステムについて説明する
  • SESで利用可能なアカウントアクセスと認証方法について説明する
トピック 5
  • エンドポイントをクラウド管理プラットフォームに接続するために必要なネットワーク要件を説明する
  • コンソールデータを利用してエンドポイントのセキュリティステータスを特定する方法を説明する
トピック 6
  • 管理されていないエンドポイントを識別するためにSESが使用するさまざまな方法を説明する
  • さまざまなメモリエクスプロイト軽減手法とSESがそれらから保護する方法を説明する
トピック 7
  • 脅威のアーティファクトと主要なエンドポイントセキュリティイベントの後に従うべきベストプラクティスを説明する
  • LiveUpdateの機能と構成オプションを説明する

 

質問 18
Which Antimalware technology is used after all local resources have been exhausted?

  • A. Sapient
  • B. Reputation
  • C. ITCS
  • D. Emulator

正解: C

 

質問 19
Which designation should an administrator assign to the computer configured to find unmanaged devices?

  • A. Discovery Agent
  • B. Discovery Broker
  • C. Discovery Device
  • D. Discovery Manager

正解: A

 

質問 20
What are the Exploit Mitigation security control's mitigation techniques designed to prevent?

  • A. Rootkit downloads
  • B. Packed file execution
  • C. Misbehaving applications
  • D. File-less attacks

正解: A

 

質問 21
After editing and saving a policy, an administrator is prompted with the option to apply the edited policy to any assigned device groups.
What happens to the new version of the policy if the administrator declines the option to apply it?

  • A. The new version of the policy is added to the "in progress" list
  • B. The new version of the policy is deleted
  • C. An unassigned version of the policy is created
  • D. The policy display is returned to edit mode

正解: D

 

質問 22
Which type of organization is likely to be targeted with emerging threats?

  • A. Small organization with externalized managed security
  • B. Small organization with little qualified staff
  • C. Large organizations with dedicated security teams
  • D. Large organization with high turnover

正解: B

 

質問 23
Which alert rule category includes events that are generated about the cloud console?

  • A. Application Activity
  • B. Diagnostic
  • C. Security
  • D. System

正解: C

 

質問 24
What version number is assigned to a duplicated policy?

  • A. Zero
  • B. The original policy's version numb
  • C. One
  • D. The original policy's number plus one

正解: D

 

質問 25
Files are blocked by hash in the blacklist policy.
Which algorithm is supported, in addition to MD5?

  • A. SHA2
  • B. SHA256
  • C. MD5 "Salted"
  • D. SHA256 "salted"

正解: B

 

質問 26
An administrator is evaluating an organization's computers for an upcoming SES deployment. Which computer meets the pre-requisites for the SES client?

  • A. A computer running Mac OS X 10.14 with 400 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processor
  • B. A computer running Mac OS X 10.8 with 500 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processor
  • C. A computer running Windows 8 with 380 MB of disk space, 2 GB of RAM, and a 2.8 GHz Intel Pentium 4 processor
  • D. A computer running Windows 10 with 400 MB of disk space, 2 GB of RAM, and a 2.4 GHz Intel Pentium 4 processor

正解: D

 

質問 27
Which SEPM-generated element is required for an administrator to complete the enrollment of SEPM to the cloud console?

  • A. SQL password
  • B. SEPM password
  • C. Token
  • D. Certificate key pair

正解: C

 

質問 28
What happens when an administrator blacklists a file?

  • A. The file is assigned to a chosen Blacklist policy
  • B. The file is automatically quarantined
  • C. The file is assigned to the Blacklist task list
  • D. The file is assigned to the default Blacklist policy

正解: C

 

質問 29
Which IPS Signature type is Primarily used to identify specific unwanted traffic?

  • A. Attack
  • B. Probe
  • C. Audit
  • D. Malcode

正解: A

 

質問 30
Which two (2) Discovery and Deploy features could an administrator use to enroll MAC endpoints? (Select two)

  • A. Invite User
  • B. A custom Direct installation package
  • C. A custom Installation package creator pact
  • D. Push Enroll
  • E. A default Direct Installation package

正解: B,C

 

質問 31
Which URL is responsible for notifying the SES agent that a policy change occurred in the cloud console?

  • A. ent-shasta.rrs-symantec.com
  • B. spoc.norton.com
  • C. ocsp.digicert.com
  • D. stnd-ipsg.crsi-symantec.com

正解: C

 

質問 32
Which two (2) skill areas are critical to the success of incident Response Teams (Select two)

  • A. Incident Management
  • B. Project Management
  • C. Threat Analysis
  • D. Incident Response
  • E. Cyber Intelligence

正解: D,E

 

質問 33
What characterizes an emerging threat in comparison to traditional threat?

  • A. Emerging threats are more sophisticated than traditional threats.
  • B. Emerging threats use new techniques and 0-day vulnerability to propagate.
  • C. Emerging threats requires artificial intelligence to be detected.
  • D. Emerging threats are undetectable by signature based engines.

正解: B

 

質問 34
Which communication method is utilized within SES to achieve real-time management?

  • A. Long polling
  • B. Heartbeat
  • C. Push Notification
  • D. Standard polling

正解: C

 

質問 35
Which term or expression is utilized when adversaries leverage existing tools in the environment?

  • A. living off the land
  • B. script kiddies
  • C. file-less attack
  • D. opportunistic attack

正解: B

 

質問 36
What is the frequency of feature updates with SES and the Integrated Cyber Defense Manager (ICDm)

  • A. Bi-monthly
  • B. Quarterly
  • C. Weekly
  • D. Monthly

正解: C

 

質問 37
Which report template type should an administrator utilize to create a daily summary of network threats detected?

  • A. Intrusion Prevention Report
  • B. Access Violation Report
  • C. Blocked Threats Report
  • D. Network Risk Report

正解: B

 

質問 38
Which file property does SES utilize to search the VirusTotal website for suspicious file information?

  • A. File hash
  • B. File reputation
  • C. File name
  • D. File size

正解: C

 

質問 39
Which Security Control dashboard widget should an administrator utilize to access detailed areas for a given security control ?

  • A. Quick Links
  • B. Learn More
  • C. Latest Tasks
  • D. More Info

正解: C

 

質問 40
Why would an administrator choose the Server-optimized installation option when creating an installation package?

  • A. To limit the Intrusion Prevention policy to use server-only signatures.
  • B. To reduce the SES client's using resources that are required for other server-specific processes.
  • C. To add the Server-optimized Firewall policy
  • D. To add the SES client's Optimize Memory setting to the default server installation.

正解: A

 

質問 41
Which option should an administrator utilize to temporarily or permanently block a file?

  • A. Delete
  • B. Encrypt
  • C. Blacklist
  • D. Hide

正解: C

 

質問 42
......

あなたを合格させるSymantec試験には250-550試験問題集:https://www.jpntest.com/shiken/250-550-mondaishu

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡