最新のSymantec 250-550試験問題解答がズラリ
250-550試験練習テスト問題(更新された72問あります)
Symantec 250-550 認定試験の出題範囲:
トピック | 出題範囲 |
---|---|
トピック 1 |
|
トピック 2 |
|
トピック 3 |
|
トピック 4 |
|
トピック 5 |
|
トピック 6 |
|
トピック 7 |
|
質問 18
Which Antimalware technology is used after all local resources have been exhausted?
- A. Sapient
- B. Reputation
- C. ITCS
- D. Emulator
正解: C
質問 19
Which designation should an administrator assign to the computer configured to find unmanaged devices?
- A. Discovery Agent
- B. Discovery Broker
- C. Discovery Device
- D. Discovery Manager
正解: A
質問 20
What are the Exploit Mitigation security control's mitigation techniques designed to prevent?
- A. Rootkit downloads
- B. Packed file execution
- C. Misbehaving applications
- D. File-less attacks
正解: A
質問 21
After editing and saving a policy, an administrator is prompted with the option to apply the edited policy to any assigned device groups.
What happens to the new version of the policy if the administrator declines the option to apply it?
- A. The new version of the policy is added to the "in progress" list
- B. The new version of the policy is deleted
- C. An unassigned version of the policy is created
- D. The policy display is returned to edit mode
正解: D
質問 22
Which type of organization is likely to be targeted with emerging threats?
- A. Small organization with externalized managed security
- B. Small organization with little qualified staff
- C. Large organizations with dedicated security teams
- D. Large organization with high turnover
正解: B
質問 23
Which alert rule category includes events that are generated about the cloud console?
- A. Application Activity
- B. Diagnostic
- C. Security
- D. System
正解: C
質問 24
What version number is assigned to a duplicated policy?
- A. Zero
- B. The original policy's version numb
- C. One
- D. The original policy's number plus one
正解: D
質問 25
Files are blocked by hash in the blacklist policy.
Which algorithm is supported, in addition to MD5?
- A. SHA2
- B. SHA256
- C. MD5 "Salted"
- D. SHA256 "salted"
正解: B
質問 26
An administrator is evaluating an organization's computers for an upcoming SES deployment. Which computer meets the pre-requisites for the SES client?
- A. A computer running Mac OS X 10.14 with 400 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processor
- B. A computer running Mac OS X 10.8 with 500 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processor
- C. A computer running Windows 8 with 380 MB of disk space, 2 GB of RAM, and a 2.8 GHz Intel Pentium 4 processor
- D. A computer running Windows 10 with 400 MB of disk space, 2 GB of RAM, and a 2.4 GHz Intel Pentium 4 processor
正解: D
質問 27
Which SEPM-generated element is required for an administrator to complete the enrollment of SEPM to the cloud console?
- A. SQL password
- B. SEPM password
- C. Token
- D. Certificate key pair
正解: C
質問 28
What happens when an administrator blacklists a file?
- A. The file is assigned to a chosen Blacklist policy
- B. The file is automatically quarantined
- C. The file is assigned to the Blacklist task list
- D. The file is assigned to the default Blacklist policy
正解: C
質問 29
Which IPS Signature type is Primarily used to identify specific unwanted traffic?
- A. Attack
- B. Probe
- C. Audit
- D. Malcode
正解: A
質問 30
Which two (2) Discovery and Deploy features could an administrator use to enroll MAC endpoints? (Select two)
- A. Invite User
- B. A custom Direct installation package
- C. A custom Installation package creator pact
- D. Push Enroll
- E. A default Direct Installation package
正解: B,C
質問 31
Which URL is responsible for notifying the SES agent that a policy change occurred in the cloud console?
- A. ent-shasta.rrs-symantec.com
- B. spoc.norton.com
- C. ocsp.digicert.com
- D. stnd-ipsg.crsi-symantec.com
正解: C
質問 32
Which two (2) skill areas are critical to the success of incident Response Teams (Select two)
- A. Incident Management
- B. Project Management
- C. Threat Analysis
- D. Incident Response
- E. Cyber Intelligence
正解: D,E
質問 33
What characterizes an emerging threat in comparison to traditional threat?
- A. Emerging threats are more sophisticated than traditional threats.
- B. Emerging threats use new techniques and 0-day vulnerability to propagate.
- C. Emerging threats requires artificial intelligence to be detected.
- D. Emerging threats are undetectable by signature based engines.
正解: B
質問 34
Which communication method is utilized within SES to achieve real-time management?
- A. Long polling
- B. Heartbeat
- C. Push Notification
- D. Standard polling
正解: C
質問 35
Which term or expression is utilized when adversaries leverage existing tools in the environment?
- A. living off the land
- B. script kiddies
- C. file-less attack
- D. opportunistic attack
正解: B
質問 36
What is the frequency of feature updates with SES and the Integrated Cyber Defense Manager (ICDm)
- A. Bi-monthly
- B. Quarterly
- C. Weekly
- D. Monthly
正解: C
質問 37
Which report template type should an administrator utilize to create a daily summary of network threats detected?
- A. Intrusion Prevention Report
- B. Access Violation Report
- C. Blocked Threats Report
- D. Network Risk Report
正解: B
質問 38
Which file property does SES utilize to search the VirusTotal website for suspicious file information?
- A. File hash
- B. File reputation
- C. File name
- D. File size
正解: C
質問 39
Which Security Control dashboard widget should an administrator utilize to access detailed areas for a given security control ?
- A. Quick Links
- B. Learn More
- C. Latest Tasks
- D. More Info
正解: C
質問 40
Why would an administrator choose the Server-optimized installation option when creating an installation package?
- A. To limit the Intrusion Prevention policy to use server-only signatures.
- B. To reduce the SES client's using resources that are required for other server-specific processes.
- C. To add the Server-optimized Firewall policy
- D. To add the SES client's Optimize Memory setting to the default server installation.
正解: A
質問 41
Which option should an administrator utilize to temporarily or permanently block a file?
- A. Delete
- B. Encrypt
- C. Blacklist
- D. Hide
正解: C
質問 42
......
あなたを合格させるSymantec試験には250-550試験問題集:https://www.jpntest.com/shiken/250-550-mondaishu