100%合格、売れ筋最上位250-550試験材料は2022年最新のSymantec練習試験合格させます
Symantec SCS Certification問題集で250-550試験完全版問題、試験学習ガイド
質問 40
What must an administrator check prior to enrolling an on-prem SEPM infrastructure into the cloud?
- A. Clients are running SEP 12-6 or later
- B. Clients are running SEP 14.1.0 or later
- C. Clients are running SEP 14.0.1 or late
- D. Clients are running SEP 14.2 or later
正解: C
質問 41
Which report template out format should an administrator utilize to generate graphical reports?
- A. XML
- B. PFD
- C. XML
- D. HTML
正解: D
質問 42
An endpoint fails to retrieve content updates.
Which URL should an administrator test in a browser to determine if the issue is network related?
- A. https://liveupdate.symantec,com/livetri.zi
- B. https://update.symantec.com/livetri.zip
- C. http://update.symantec.com/livetri.zip
- D. https://spocsymantec.com/livetri.zip
正解: D
質問 43
An administrator is evaluating an organization's computers for an upcoming SES deployment. Which computer meets the pre-requisites for the SES client?
- A. A computer running Windows 10 with 400 MB of disk space, 2 GB of RAM, and a 2.4 GHz Intel Pentium 4 processor
- B. A computer running Windows 8 with 380 MB of disk space, 2 GB of RAM, and a 2.8 GHz Intel Pentium 4 processor
- C. A computer running Mac OS X 10.14 with 400 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processor
- D. A computer running Mac OS X 10.8 with 500 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processor
正解: A
質問 44
What is the frequency of feature updates with SES and the Integrated Cyber Defense Manager (ICDm)
- A. Weekly
- B. Monthly
- C. Bi-monthly
- D. Quarterly
正解: A
質問 45
What is the primary issue pertaining to managing roaming users while utilizing an on-premise solution?
- A. The endpoint fails to receive content update
- B. The endpoint is more exposed to threats
- C. The endpoint is missing timely policy update
- D. The endpoint is absent of the management console
正解: A
質問 46
Which report template includes a summary of risk distribution by devices, users, and groups?
- A. Weekly
- B. Comprehensive
- C. Threat Distribution
- D. Device Integrity
正解: C
質問 47
Which antimalware intensity level is defined by the following: "Blocks files that are most certainly bad or potentially bad files. Results in a comparable number of false positives and false negatives."
- A. Level 1
- B. Level 2
- C. Level 5
- D. Level 6
正解: D
質問 48
Which alert rule category includes events that are generated about the cloud console?
- A. Application Activity
- B. Security
- C. System
- D. Diagnostic
正解: B
質問 49
Which file property does SES utilize to search the VirusTotal website for suspicious file information?
- A. File hash
- B. File name
- C. File size
- D. File reputation
正解: B
質問 50
Which statement best describes Artificial Intelligence?
- A. A program that can predict when a task should be performed
- B. A program that automates tasks with a static set of instructions
- C. A program that is autonomous and needs training to perform a task
- D. A program that learns from experience and perform autonomous tasks
正解: B
質問 51
Which type of organization is likely to be targeted with emerging threats?
- A. Large organization with high turnover
- B. Large organizations with dedicated security teams
- C. Small organization with little qualified staff
- D. Small organization with externalized managed security
正解: C
質問 52
Which SES advanced feature detects malware by consulting a training model composed of known good and known bad fries?
- A. Signatures
- B. Reputation
- C. Advanced Machine Learning
- D. Artificial Intelligence
正解: C
質問 53
Why would an administrator choose the Server-optimized installation option when creating an installation package?
- A. To reduce the SES client's using resources that are required for other server-specific processes.
- B. To limit the Intrusion Prevention policy to use server-only signatures.
- C. To add the Server-optimized Firewall policy
- D. To add the SES client's Optimize Memory setting to the default server installation.
正解: B
質問 54
An administrator must create a custom role in ICDm.
Which area of the management console is able to have access restricted or granted?
- A. Custom Dashboard Creation
- B. Policy Management
- C. Hybrid device management
- D. Agent deployment
正解: D
質問 55
What are the Exploit Mitigation security control's mitigation techniques designed to prevent?
- A. Packed file execution
- B. Misbehaving applications
- C. Rootkit downloads
- D. File-less attacks
正解: C
質問 56
An administrator needs to create a new Report Template that will be used to track firewall activity. Which two (2) report template settings are optional? (Select 2)
- A. Size restrictions
- B. Output format
- C. Generation schedule
- D. Time frame
- E. Email recipients
正解: B,E
質問 57
Which file should an administrator create, resulting Group Policy Object (GPO)?
- A. Symantec__Agent_package__32-bit.msi
- B. Symantec__Agent_package_x64.msi
- C. Symantec__Agent_package_x64.zip
- D. Symantec__Agent_package_x64.exe
正解: A
質問 58
Which two (2) skill areas are critical to the success of incident Response Teams (Select two)
- A. Threat Analysis
- B. Project Management
- C. Incident Response
- D. Cyber Intelligence
- E. Incident Management
正解: C,D
質問 59
What happens when an administrator blacklists a file?
- A. The file is automatically quarantined
- B. The file is assigned to the default Blacklist policy
- C. The file is assigned to a chosen Blacklist policy
- D. The file is assigned to the Blacklist task list
正解: D
質問 60
Which policy should an administrator edit to utilize the Symantec LiveUpdate server for pre-release content?
- A. The System Schedule Policy
- B. The System Policy
- C. The Firewall Policy
- D. The LiveUpdate Policy
正解: D
質問 61
What does an end-user receive when an administrator utilizes the Invite User feature to distribute the SES client?
- A. An email with a link to a KB article explaining how to install the SES Agent
- B. An email with a link to directly download the SES client
- C. An email with the SES_setup.zip file attached
- D. An email with link to register on the ICDm user portal
正解: D
質問 62
Which dashboard should an administrator access to view the current health of the environment?
- A. The Security Control Dashboard
- B. The SES Dashboard
- C. The Device Integrity Dashboard
- D. The Antimalware Dashboard
正解: A
質問 63
Which rule types should be at the bottom of the list when an administrator adds device control rules?
- A. General "brand defined" rules
- B. Specific "device model" rules
- C. General "catch all" rules
- D. Specific "device type" rules
正解: B
質問 64
......
正真正銘のベスト試験材料250-550オンライン練習試験:https://www.jpntest.com/shiken/250-550-mondaishu