IT인증,IT자격증,IT자격증시험,IT인증시험

http://www.pass4test.net/

Symantec Certified Security program ST0-134 덤프데모

Pass4Test의  Symantec Certified Security program ST0-134 덤프는 수많은 시험준비 공부자료 중 가장 믿음직합니다. Pass4Test의 인지도는 업계에 널리 알려져 있습니다. Symantec Certified Security program ST0-134덤프로  Symantec Certified Security program ST0-134시험을 준비하여 한방에 시험패스한 분이 너무나도 많습니다.Symantec Certified Security program ST0-134덤프는 실제  Symantec Certified Security program ST0-134시험문제에 초점을 맞추어 제작한 최신버전 덤프로서 시험패스율이 100%에 달합니다.

 

NO.1 An administrator is modifying a Virus and Spyware Protection policy for a Symantec Endpoint
Protection 12.1 (SEP) client because it is demonstrating poor boot performance. Which option should
the administrator consider to alleviate this problem?
A. Ensure that Risk Tracer is disabled.
B. Load Auto-Protect during the startup of SEP.
C. Enable File Cache across reboots.
D. Modify the policy to use Insight Cache.
Answer: B

NO.2 Some customers report that when they run the command "smc -stop" on their clients, they are
unable to connect to network resources. What is wrong?
A. The customers need to enable the Smart DHCP option in their firewall policy.
B. The security option "Block all traffic until the firewall starts and after the firewall stops" is enabled.
C. A location awareness policy has been configured that applies when the service is stopped.
D. The network card is blocked by a Device Control policy.
Answer: B

NO.3 A Symantec Endpoint Protection 12.1 administrator has the Virus and Spyware Protection policy
configured with Auto-Protect enabled. The administrator is confronted with computer performance
issues. Which two options can the administrator use to improve performance? (Select two.)
A. Enable the option to Trust Files on Remote Computers Running Auto-Protect.
B. Enable the Risk Tracer option.
C. Edit the autoprotect.xml and increase the cache value.
D. Enable the option of Network Cache.
E. Enable the Preserve File Times option.
Answer: A,D

NO.4 Which two criteria can be used to determine hosts in a host group? (Select two.)
A. MAC address
B. registry key
C. management server connection
D. DNS host network connection type
Answer: A,D

NO.5 Acrobat Reader is being targeted by a threat using process injection. Which feature of SONAR is
sandboxing Acroread32.exe so that the threat is prevented from dropping its payload?
A. Commercial Application Detection
B. Suspicious Behavior Detection
C. System Change Events
D. Signature Based Detection
Answer: B

NO.6 A company deploys Symantec Endpoint Protection client to its sales staff who travel across the
country. Which deployment method should the company use to notify its sales staff to install the
client?
A. Push mode
B. Client Deployment Wizard
C. Pull mode
D. Unmanaged Detector
Answer: B

NO.7 Which action should an administrator take to prevent users from using Windows Security
Center?
A. set Disable antivirus alert within Windows Security Center to Disable
B. set Disable antivirus alert within Windows Security Center to Never
C. set Disable Windows Security Center to Disable
D. set Disable Windows Security Center to Always
Answer: D

NO.8 Which Symantec Endpoint Protection Management (SEPM) database option is the default for
deployments of fewer than 1,000 clients?
A. Embedded Using the Sybase SQL Anywhere database that comes with the product
B. On SEPM Installing Microsoft SQL on the same server as the SEPM
C. External to SEPM Using a preexisting Microsoft SQL server in the environment
D. Embedded Using the Microsoft SQL database that comes with the product
Answer: A

Posted 2014/12/12 10:33:52  |  Category: Symantec  |  Tag: ST0-134 덤프데모