IT인증,IT자격증,IT자격증시험,IT인증시험

http://www.pass4test.net/

STS-Partner-Accreditation ST0-29B

STS-Partner-Accreditation ST0-29B인증시험은 현재 IT인사들 중 아주 인기 있는 인증시험입니다.STS-Partner-Accreditation ST0-29B 시험패스는 여러분의 하시는 일과 생활에서 많은 도움을 줄 뿐만 아니라 중요한 건 여러분의 IT업계에서의 자기만의 자리를 지키는 유력한 조건입니다. 이렇게좋은 시험이니 많은 분들이 응시하려고 하는데 패스율은 아주 낮습니다.Pass4Test는  STS-Partner-Accreditation ST0-29B 인증시험을 아주 쉽게 패스할 수 있도록 도와드리는 사이트입니다. Pass4Test의 엘리트한 전문가가 끊임 없는 노력으로 최고의  STS-Partner-Accreditation ST0-29B 자료를 만들었습니다. 이 자료로 여러분은 100%   STS-Partner-Accreditation ST0-29B 인증시험을 패스할 수 있으며 Pass4Test을 선택함으로 성공을 선택한 것과 같습니다. Pass4Test가 제공하는 시험가이드로 효과적인 학습으로 많은 분들이 모두 인증시험을 패스하였습니다. 이건 모두Pass4Test 인증시험덤프로 시험준비를 하셨기 때문입니다. 그 중  STS-Partner-Accreditation ST0-29B 인증시험을 패스한 분들도  Pass4Test인증시험 덤프를 사용하셨기 때문입니다.

 

 

 

NO.1 An administrator needs a TruScan Proactive Threat scan that will detect a potential trojan, worm, or
keylogger as quickly as possible. How should the administrator set the scan frequency?
A. set it to continuous
B. set it to scan new processes immediately
C. select the default setting
D. set it to 5 minutes
Answer: B

NO.2 If a Symantec Endpoint Protection (SEP) client is installed with AntiVirus and AntiSpyware components
only, what must be done to install the SEP Firewall?
A. redeploy the original installation package to the client
B. deploy the firewall license file to the Symantec Endpoint Protection Manager
C. deploy a new package including the firewall component
D. deploy a firewall policy to that client through an XML file
Answer: C

NO.3 An administrator makes a change in the Active Directory structure, which has been imported into
Symantec Endpoint Protection Manager (SEPM). By default, when will the change automatically be
reflected in SEPM?
A. as soon as the change is made in Active Directory
B. maximum 1 hour
C. maximum 4 hours
D. maximum 24 hours
Answer: D

NO.4 Immediately after installation, what does a client do upon first contacting Symantec Endpoint Security
Manager?
A. register with the manager
B. download the latest policy
C. update virus definitions
D. launch a full system scan
Answer: A

NO.5 Which two actions can the Centralized Exception policy perform? (Select two.)
A.exclude a specific folder from AntiVirus and AntiSpyware File System Auto-Protect scanning
B.specify an exclusion to keep a known risk from being scanned
C.specify machines from which the Symantec Endpoint Protection Manager console cannot be run
D.exclude forwarding of certain log types from the Symantec Endpoint Protection client
E.specify Intrusion Prevention system signatures for exclusion
Answer: A, B

NO.6 Which two actions are available when TruScan Proactive Threat Scan detects a trojan or worm?
(Select two.)
A.delete
B.ignore
C.terminate
D.quarantine
E.clean
Answer: C, D

NO.7 How many Symantec Endpoint Protection Managers can connect to an embedded database?
A. one
B. two
C. four
D. unlimited
Answer: A

NO.8 A Symantec Endpoint Protection Manager administrator is importing from an Active Directory
environment. The director needs to know which object types are being imported. Which two object types
are imported into Symantec Endpoint Protection Manager from Active Directory? (Select two.)
A.security groups
B.organizational units
C.computers
D.sites
E.domains
Answer: B, C

NO.9 In which client management log can an administrator identify when the client last connected to the
Symantec Endpoint Protection Manager?
A. Control
B. Traffic
C. System
D. Event
Answer: C

NO.10 Which two features migrate from previous versions of Symantec AntiVirus? (Select two.)
A.Tamper Protection Settings
B.AntiVirus Settings
C.Uninstall Password
D.Client Group Structure
E.Firewall Settings
Answer: B, D

NO.11 Which Symantec Endpoint Protection client component must be installed to enable Unmanaged
Detector mode?
A. AntiVirus and AntiSpyware
B. Application and Device Control
C. Network Threat Protection
D. Network Access Control
Answer: C

NO.12 An administrator has successfully installed Symantec Endpoint Protection Manager onto a Windows
2003 Server using the installation wizard. Which component is deployed to the server at this point in time?
A. AntiVirus/AntiSpyware Protection
B. Proactive Threat Protection
C. Apache Tomcat Server
D. Central Quarantine Server
E. Network Threat Protection
Answer: C

NO.13 Based on Symantec best practices, which two tasks should be performed before migrating from
Symantec AntiVirus Corporate Edition to Symantec Endpoint Protection 11.0? (Select two.)
A.disable Auto-Protect
B.disable scheduled scans
C.disable Tamper Protection
D.scan all clients
E.purge the quarantine
Answer: B, C

NO.14 What is the default replication frequency when adding an additional site to a Symantec Endpoint
Protection deployment?
A. 1 hour
B. 8 hours
C. daily
D. weekly
Answer: C

NO.15 Which file contains the Symantec Endpoint Protection client communication settings?
A. GRC.dat
B. Sylink.xml
C. GRC.xml
D. Sylink.dat
Answer: A

NO.16 Which feature can be configured to increase or decrease performance of scheduled scans?
A. scan frequency
B. CPU throttling
C. heartbeat interval
D. tuning options
Answer: D

NO.17 Which remediation option is available to administrators using the Find Unmanaged Computers
feature?
A. deploy a Symantec Endpoint Protection client package to the unmanaged host
B. monitor and log network traffic observed from the unmanaged host
C. install Microsoft Windows operating system security patches
D. disable network access pending Symantec Endpoint Protection client installation
Answer: C

NO.18 Which setting can be enabled to report computers without a Symantec Endpoint Protection Agent?
A. LAN Detector
B. Unmanaged Detector
C. Segment Detector
D. Network Detector
Answer: D

NO.19 When using the Push Deployment Wizard, which two methods can be used to identify the target
machines to which you want to install the Symantec Endpoint Protection client? (Select two.)
A.browse through Windows networking
B.import a file containing IP addresses
C.specify a UNC path
D.import a file containing MAC addresses
E.import hostnames from an LDAP server
Answer: A, B

NO.20 What can an administrator do to proactively obtain information about unknown devices on a network?
A. script a network audit using the Find Unmanaged Computers feature
B. create an Unmanaged Computer notification
C. schedule an audit report to send to the administrator
D. schedule regular LDAP synchronization
Answer: B
Posted 2012/12/26 3:59:07  |  Category: 미분류  |  Tag: