250-561練習テスト問題解答には更新された72問があります [Q43-Q58]

Share

250-561練習テスト問題解答には更新された72問があります

250-561問題集はSymantec SCS合格確定させる練習で72問があります


Symantec 250-561(Endpoint Security Complete-Administration R1)試験は、組織内でエンドポイントセキュリティソリューションを管理する責任を持つプロフェッショナルのスキルと知識をテストする認定試験です。この試験は、Symantec Endpoint Protection Cloud、Symantec Endpoint Protection Small Business Edition、Symantec Endpoint ProtectionなどのSymantec Endpoint Protectionテクノロジーを構成および管理する個人の専門知識を検証するために設計されています。


Symantec 250-561(エンドポイントセキュリティComplete -Administration R1)認定試験は、エンドポイントセキュリティソリューションの管理におけるIT専門家の知識とスキルを証明するように設計されています。認定試験では、脅威防止、インシデント対応、高度な脅威保護など、エンドポイントセキュリティに関連するさまざまなトピックを対象としています。

 

質問 # 43
Which device page should an administrator view to track the progress of an issued device command?

  • A. Command Status
  • B. Activity Update
  • C. Command History
  • D. Recent Activity

正解:D


質問 # 44
The ICDm has generated a blacklist task due to malicious traffic detection. Which SES component was utilized to make that detection?

  • A. IPS
  • B. Firewall
  • C. Antimalware
  • D. Reputation

正解:C


質問 # 45
An administrator needs to create a new Report Template that will be used to track firewall activity. Which two (2) report template settings are optional? (Select 2)

  • A. Time frame
  • B. Email recipients
  • C. Size restrictions
  • D. Output format
  • E. Generation schedule

正解:B、D


質問 # 46
Which two (2) scan range options are available to an administrator for locating unmanaged endpoints? (Select two)

  • A. Entire Network
  • B. Entire Subnet
  • C. Subnet Range
  • D. IP range within network
  • E. IP range within subnet

正解:C、D


質問 # 47
Which default role has the most limited permission in the Integrated Cyber Defense Manager?

  • A. Endpoint Console Domain Administrator
  • B. Limited Administrator
  • C. Server Administrator
  • D. Restricted Administrator

正解:C


質問 # 48
Which rule types should be at the bottom of the list when an administrator adds device control rules?

  • A. Specific "device model" rules
  • B. Specific "device type" rules
  • C. General "brand defined" rules
  • D. General "catch all" rules

正解:A


質問 # 49
What must an administrator check prior to enrolling an on-prem SEPM infrastructure into the cloud?

  • A. Clients are running SEP 12-6 or later
  • B. Clients are running SEP 14.2 or later
  • C. Clients are running SEP 14.1.0 or later
  • D. Clients are running SEP 14.0.1 or late

正解:D


質問 # 50
After editing and saving a policy, an administrator is prompted with the option to apply the edited policy to any assigned device groups.
What happens to the new version of the policy if the administrator declines the option to apply it?

  • A. The new version of the policy is added to the "in progress" list
  • B. The policy display is returned to edit mode
  • C. An unassigned version of the policy is created
  • D. The new version of the policy is deleted

正解:B


質問 # 51
Which two (2) steps should an administrator take to guard against re-occurring threats? (Select two)

  • A. Use Power Eraser to clean endpoint Windows registries
  • B. Confirm that daily active and weekly full scans take place on all endpoints
  • C. Verify that all endpoints receive scheduled Live-Update content
  • D. Quarantine affected endpoints
  • E. Add endpoints to a high security group and assign a restrictive Antimalware policy to the group

正解:A、D


質問 # 52
In which phase of MITRE framework would attackers exploit faults in software to directly tamper with system memory?

  • A. Discovery
  • B. Defense Evasion
  • C. Execution
  • D. Exfiltration

正解:B


質問 # 53
What does SES's advanced search feature provide when an administrator searches for a specific term?

  • A. A suggested terms dialog
  • B. A search wizard dialog
  • C. A search modifier dialog
  • D. A search summary dialog

正解:C


質問 # 54
Which technique randomizes the e memory address map with Memory Exploit Mitigation?

  • A. ASLR
  • B. ROPHEAP
  • C. SEHOP
  • D. ForceDEP

正解:A


質問 # 55
Which framework, open and available to any administrator, is utilized to categorize adversarial tactics and for each phase of a cyber attack?

  • A. MITRE ATT&CK
  • B. MITRE ADV&NCE
  • C. MITRE ATTACK MATRIX
  • D. MITRE RESPONSE

正解:B


質問 # 56
An endpoint fails to retrieve content updates.
Which URL should an administrator test in a browser to determine if the issue is network related?

  • A. http://update.symantec.com/livetri.zip
  • B. https://spocsymantec.com/livetri.zip
  • C. https://liveupdate.symantec,com/livetri.zi
  • D. https://update.symantec.com/livetri.zip

正解:B


質問 # 57
How long does a blacklist task remain in the My Tasks view after its automatic creation?

  • A. 90 Days
  • B. 60 Days
  • C. 180 Days
  • D. 30 Days

正解:D


質問 # 58
......


この試験は、エンドポイントセキュリティ技術、脅威検出と対応、ポリシー管理、コンプライアンス規制など、幅広いトピックをカバーしています。候補者は、マルウェア、ランサムウェア、フィッシング攻撃、高度な持続的脅威など、さまざまな脅威から保護できるエンドポイントセキュリティソリューションを設計、展開、構成、保守する能力をテストされます。

 

最新250-561試験問題にはリアルな250-561問題集があります:https://www.jpntest.com/shiken/250-561-mondaishu

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡