免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
最近访问板块 发新帖
查看: 1415 | 回复: 1
打印 上一主题 下一主题

ST0-29B考題下載 [复制链接]

论坛徽章:
0
跳转到指定楼层
1 [收藏(0)] [报告]
发表于 2010-12-12 18:38 |只看该作者 |倒序浏览
<p align="left"><p align="left">最新ST0-29B考題分享</p></p><p align="left"><p align="left">1. How should an administrator define an Active Directory domain controller for synchronization from the Symantec Endpoint Protection Manager console Admin page, Servers view?</p></p><p align="left"><p align="left">A. highlight Local Site &gt; click Edit Site Properties</p></p><p align="left"><p align="left">B. highlight Local Site &gt; click Add Replication Partner</p></p><p align="left"><p align="left">C. highlight Management Server &gt; click Edit Server Properties</p></p><p align="left"><p align="left">D. highlight Database Server &gt; click Edit Database Properties</p></p><p align="left"><p align="left">Answer: C</p></p><p align="left"><p align="left">2. In which order are exceptions processed?</p></p><p align="left"><p align="left">A. AntiSpyware then AntiVirus</p></p><p align="left"><p align="left">B. Administrator then User</p></p><p align="left"><p align="left">C. Intrusion Prevention then Firewall</p></p><p align="left"><p align="left">D. Computer mode then User mode</p></p><p align="left"><p align="left">Answer: B</p></p><p align="left"><p align="left">3. From which group do clients inherit firewall rules, by default?</p></p><p align="left"><p align="left">A. Main</p></p><p align="left"><p align="left">B. Temporary</p></p><p align="left"><p align="left">C. Default</p></p><p align="left"><p align="left">D. My Company</p></p><p align="left"><p align="left">Answer: D</p></p><p align="left"><p align="left">4. An administrator needs to exclude some servers from an Intrusion Prevention System (IPS) policy.</p></p><p align="left"><p align="left">When specifying an excluded host in an IPS policy, which two methods can be used? (Select two.)</p></p><p align="left"><p align="left">A. DNS host</p></p><p align="left"><p align="left">B. IP address</p></p><p align="left"><p align="left">C. MAC address</p></p><p align="left"><p align="left">D. DNS domain</p></p><p align="left"><p align="left">E. subnet</p></p><p align="left"><p align="left">Answer: BE</p></p><p align="left"><p align="left">5. Scheduled reports are delivered as which type?</p></p><p align="left"><p align="left">A. HTML</p></p><p align="left"><p align="left">B. PDF</p></p><p align="left"><p align="left">C. MHT</p></p><p align="left"><p align="left">D. CSV</p></p><p align="left"><p align="left">Answer: C</p></p><p align="left"><p align="left">6. A group is configured for push communication. New content updates become available on the SymantecEndpoint Protection Manager that manages the clients within this group.When should the clients in the group get the new content updates?</p></p><p align="left"><p align="left">A. immediately</p></p><p align="left"><p align="left">B. 1 hour</p></p><p align="left"><p align="left">C. 24 hours</p></p><p align="left"><p align="left">3 / 3</p></p><p align="left"><p align="left">D. 48 hours</p></p><p align="left"><p align="left">Answer: D</p></p><p align="left"><p align="left">7. What is the first step to take when migrating data from an embedded database to an external MS-SQLdatabase?</p></p><p align="left"><p align="left">A. back up the embedded database</p></p><p align="left"><p align="left">B. configure external logging</p></p><p align="left"><p align="left">C. add replication partner</p></p><p align="left"><p align="left">D. perform Active Directory synchronization</p></p><p align="left"><p align="left">Answer: D</p></p><p align="left"><p align="left">8. Which two are needed in order to add a replication partner? (Select two.)</p></p><p align="left"><p align="left">A. domain user and password</p></p><p align="left"><p align="left">B. administrator name and password</p></p><p align="left"><p align="left">C. domain administrator name and password</p></p><p align="left"><p align="left">D. replication server name and port</p></p><p align="left"><p align="left">E. database user and password</p></p><p align="left"><p align="left">Answer: BD</p></p><p align="left"><p align="left">9. Which two statements describe the interactions between Symantec Endpoint Protection 11.0 and Quarantine Server? (Select two.)</p></p><p align="left"><p align="left">A. Clients upload log data and quarantined files to Symantec Endpoint Protection Manager, which forwards the files to the Quarantine Server.</p></p><p align="left"><p align="left">B. Clients upload log data to Symantec Endpoint Protection Manager and upload quarantined files to Quarantine Server.</p></p><p align="left"><p align="left">C. Clients upload log data and quarantined files to the Quarantine Server, which forwards the log data to the Symantec Endpoint Protection Manager.</p></p><p align="left"><p align="left">D. Symantec Endpoint Protection Manager sends quarantine settings, which define the location of the Quarantine Server, to managed clients.</p></p><p align="left"><p align="left">E. The Quarantine Server sends its location and quarantine policies and rules to all clients.</p></p><p align="left"><p align="left">Answer: BD</p></p><p align="left"><p align="left">10. Which network threat protection technologies of the Symantec Endpoint Protection client provide the primary protection layers against network attacks?</p></p><p align="left"><p align="left">A. Proactive Threat Protection and Application Control</p></p><p align="left"><p align="left">B. Proactive Threat Protection and Client Firewall</p></p><p align="left"><p align="left">C. Intrusion Prevention and Client Firewall</p></p><p align="left"><p align="left">D. Client Firewall and Device Control</p></p><p align="left"><p align="left">Answer: C</p></p>

论坛徽章:
0
2 [报告]
发表于 2010-12-22 23:31 |只看该作者
好难呀 !!!!!!!!
您需要登录后才可以回帖 登录 | 注册

本版积分规则 发表回复

  

北京盛拓优讯信息技术有限公司. 版权所有 京ICP备16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122 niuxiaotong@pcpop.com 17352615567
未成年举报专区
中国互联网协会会员  联系我们:huangweiwei@itpub.net
感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

清除 Cookies - ChinaUnix - Archiver - WAP - TOP