- 论坛徽章:
- 0
|
<p align="left"><p align="left">最新ST0-29B考題分享</p></p><p align="left"><p align="left">1. How should an administrator define an Active Directory domain controller for synchronization from the Symantec Endpoint Protection Manager console Admin page, Servers view?</p></p><p align="left"><p align="left">A. highlight Local Site > click Edit Site Properties</p></p><p align="left"><p align="left">B. highlight Local Site > click Add Replication Partner</p></p><p align="left"><p align="left">C. highlight Management Server > click Edit Server Properties</p></p><p align="left"><p align="left">D. highlight Database Server > click Edit Database Properties</p></p><p align="left"><p align="left">Answer: C</p></p><p align="left"><p align="left">2. In which order are exceptions processed?</p></p><p align="left"><p align="left">A. AntiSpyware then AntiVirus</p></p><p align="left"><p align="left">B. Administrator then User</p></p><p align="left"><p align="left">C. Intrusion Prevention then Firewall</p></p><p align="left"><p align="left">D. Computer mode then User mode</p></p><p align="left"><p align="left">Answer: B</p></p><p align="left"><p align="left">3. From which group do clients inherit firewall rules, by default?</p></p><p align="left"><p align="left">A. Main</p></p><p align="left"><p align="left">B. Temporary</p></p><p align="left"><p align="left">C. Default</p></p><p align="left"><p align="left">D. My Company</p></p><p align="left"><p align="left">Answer: D</p></p><p align="left"><p align="left">4. An administrator needs to exclude some servers from an Intrusion Prevention System (IPS) policy.</p></p><p align="left"><p align="left">When specifying an excluded host in an IPS policy, which two methods can be used? (Select two.)</p></p><p align="left"><p align="left">A. DNS host</p></p><p align="left"><p align="left">B. IP address</p></p><p align="left"><p align="left">C. MAC address</p></p><p align="left"><p align="left">D. DNS domain</p></p><p align="left"><p align="left">E. subnet</p></p><p align="left"><p align="left">Answer: BE</p></p><p align="left"><p align="left">5. Scheduled reports are delivered as which type?</p></p><p align="left"><p align="left">A. HTML</p></p><p align="left"><p align="left">B. PDF</p></p><p align="left"><p align="left">C. MHT</p></p><p align="left"><p align="left">D. CSV</p></p><p align="left"><p align="left">Answer: C</p></p><p align="left"><p align="left">6. A group is configured for push communication. New content updates become available on the SymantecEndpoint Protection Manager that manages the clients within this group.When should the clients in the group get the new content updates?</p></p><p align="left"><p align="left">A. immediately</p></p><p align="left"><p align="left">B. 1 hour</p></p><p align="left"><p align="left">C. 24 hours</p></p><p align="left"><p align="left">3 / 3</p></p><p align="left"><p align="left">D. 48 hours</p></p><p align="left"><p align="left">Answer: D</p></p><p align="left"><p align="left">7. What is the first step to take when migrating data from an embedded database to an external MS-SQLdatabase?</p></p><p align="left"><p align="left">A. back up the embedded database</p></p><p align="left"><p align="left">B. configure external logging</p></p><p align="left"><p align="left">C. add replication partner</p></p><p align="left"><p align="left">D. perform Active Directory synchronization</p></p><p align="left"><p align="left">Answer: D</p></p><p align="left"><p align="left">8. Which two are needed in order to add a replication partner? (Select two.)</p></p><p align="left"><p align="left">A. domain user and password</p></p><p align="left"><p align="left">B. administrator name and password</p></p><p align="left"><p align="left">C. domain administrator name and password</p></p><p align="left"><p align="left">D. replication server name and port</p></p><p align="left"><p align="left">E. database user and password</p></p><p align="left"><p align="left">Answer: BD</p></p><p align="left"><p align="left">9. Which two statements describe the interactions between Symantec Endpoint Protection 11.0 and Quarantine Server? (Select two.)</p></p><p align="left"><p align="left">A. Clients upload log data and quarantined files to Symantec Endpoint Protection Manager, which forwards the files to the Quarantine Server.</p></p><p align="left"><p align="left">B. Clients upload log data to Symantec Endpoint Protection Manager and upload quarantined files to Quarantine Server.</p></p><p align="left"><p align="left">C. Clients upload log data and quarantined files to the Quarantine Server, which forwards the log data to the Symantec Endpoint Protection Manager.</p></p><p align="left"><p align="left">D. Symantec Endpoint Protection Manager sends quarantine settings, which define the location of the Quarantine Server, to managed clients.</p></p><p align="left"><p align="left">E. The Quarantine Server sends its location and quarantine policies and rules to all clients.</p></p><p align="left"><p align="left">Answer: BD</p></p><p align="left"><p align="left">10. Which network threat protection technologies of the Symantec Endpoint Protection client provide the primary protection layers against network attacks?</p></p><p align="left"><p align="left">A. Proactive Threat Protection and Application Control</p></p><p align="left"><p align="left">B. Proactive Threat Protection and Client Firewall</p></p><p align="left"><p align="left">C. Intrusion Prevention and Client Firewall</p></p><p align="left"><p align="left">D. Client Firewall and Device Control</p></p><p align="left"><p align="left">Answer: C</p></p> |
|