当前位置:文档之家› SEP SSE+100%

SEP SSE+100%

SEP SSE+100%
SEP SSE+100%

SALES PLUS ASSESMENT SCORE REPORT

ASSESMENT:Symantec Endpoint Protection 12.1 (September 2012) Sales Plus Assessment DATE: Sunday, November 17,

2013

PASSING SCORE:75% YOUR

SCORE: 100%

GRADE:PASS

Note Regarding Score: Assessment scores normally post to CertTracker within 2-3 business days. As soon as your assessment score posts to CertTracker, you will receive an automated message via email; if you are new to CertTracker, you will receive an account activation notice as well.

Note Regarding Certificate: Once your passing assessment score has posted to CertTracker, you will receive an electronic certificate via email within one business day.

Contact Information: If you have questions or need assistance, please

contact global_exams@https://www.doczj.com/doc/5b6538440.html, Please note that assessment scores normally post to CertTracker within 2-3 business days. Your score will not be available in CertTracker before this time.

This information below is provided to assist you with identifying areas where additional training may be needed.

If you wish to save your score report please use print screen or a screen capture program.

Results by topic:

Question 1 of 25

Which statement about IT Analytics is true?

ITA works with the embedded database.

ITA requires the user to know about OLAP to extract reports.

ITA allows for users to create multidimensional ad-hoc reports.

ITA requires add on licensing to be purchased.

1 out of 1

Question 2 of 25

On the Insight reputation scoring system, which status would receive a file with the following attributes: New, Low prevalence, No records of malicious activity?

Highly Untrusted

Unproven

Trusted

Community Trusted

1 out of 1

Question 3 of 25

In order to remote push a SEP package to a Windows 8 machine, which 3 steps must be performed?

Disable UAC for local users, enable the administrator account, and disable Windows firewall.

Enable the administrator account, disable the remote registry service, and disable the Windows firewall.

Disable UAC for remote users, enable the share IPC$, and configure Windows firewall to allow SMB traffic.

Disable UAC for remote users, enable remote registry service, and disable Windows firewall.

1 out of 1

Question 4 of 25

Match this definition to one of the terms below: The period of time during which a VM is not fully patched or up to date.

Instant on gap

Temporary rogue client

Template cloning period

Missed event window

1 out of 1

Question 5 of 25

Insight supports a wide range of protection technologies. Which technology does Insight help in increasing performance?

Download protection

Antivirus and Antispyware

IPS

SONAR

1 out of 1

To which account type does Site rights apply?

Active Directory

System Administrator

Administrator

Limited Administrator

1 out of 1

Question 7 of 25

EICAR is a virus test file, why does IPS find it as an attack?

Insight detects the file as untrustworthy.

SONAR monitors the Internet browser and passes the result to IPS.

Security response added a signature for EICAR to the IPS engine.

This is a false positive

1 out of 1

Question 8 of 25

What should you do just before running VIE?

Install .Net framework 4.0.

Install SEP 12.1.

Run a full scan with the latest definitions.

Create a backup of your VM.

1 out of 1

What is the key concern with antivirus scanning on a virtual environment?

Speed

Duration

Bottleneck

Efficacy

1 out of 1

Question 10 of 25

Which database engine is supported with SEP 12.1.2?

SQL 2000 SP3

SQL 2012

Oracle 9i

MySQL 5

1 out of 1

Question 11 of 25

With the rise of unique malware variants, which protection technology is best suited to prevent zero-day threats?

Insight

Device control

Firewall

Antivirus and antispyware

1 out of 1

Match the feature to the following description: Windows-based and hypervisor agnostic scan de-duplication agent.

VIE

vSIC

SIC

vShield Endpoint

1 out of 1

Question 13 of 25

To prevent high-profile false positives, which steps are taken by SONAR?

SONAR never deletes files that are part of the operating system.

SONAR never monitors Windows DLLs.

SONAR never inspects files signed by trusted class-3 co-signers.

SONAR never injects processes signed by Symantec.

1 out of 1

Question 14 of 25

According to the Internet Threat Report, Volume 17, how many unique malware variant were discovered in 2011?

286 000 000

303 000 000

403 000 000

486 000 000

1 out of 1

Question 15 of 25

In the vSphere ecosystem, which software component is managing the creation of VM from a template?

vSphere client

vShield Endpoint

vCenter

ESXi

1 out of 1

Question 16 of 25

A customer has 2500 endpoints across two sites with a high-bandwidth Internet access/WAN. The customer wants to use ITAnalytics for advanced reporting and to reduce hardware costs. Which database and site topology do you advise?

Single site, SQL

Distributed, SQL

Distributed, Embedded

Single site, Embedded

1 out of 1

Question 17 of 25

A customer wants to use vSIC, but the VM the customer wants to protect is not appearing on the vShield Manager console. What is missing?

vShield drivers, which are part of the VMware tools.

The SEP 12.1 client

The customer did not install the vCenter License.

The customer did not install the Symantec Security Virtual Appliance (SVA).

1 out of 1

Question 18 of 25

In which folder on the SEPM Web server do you create the demo folder to demo the protection technologies where EICAR and Cloud Car are hosted?

Under C:\Program Data\Symantec\Symantec Endpoint Protection Manager\intetpub

Under C:\Program Files\Symantec\Symantec Endpoint Protection Manager\inetpub

Under C:\Program Files\Symantec\Symantec Endpoint Protection Manager\Data\outbox

Under C:\Program Data\Symantec\Symantec Endpoint Protection Manager\

1 out of 1

Question 19 of 25

When testing download protection, what is mandatory for the demo to work as planned?

Administrator rights

Firewall

Internet access

Fixed IP

1 out of 1

Question 20 of 25

An enterprise customer has clients with an over-deployed license, which of these statements is correct?

The over-deployed clients can submit a reputation report to Insight.

The over-deployed clients cannot receive new definitions.

The administrator will receive e-mails and pop-ups about over-deployed clients.

The administrator will be prompted to uninstall the over-deployed clients.

1 out of 1

Question 21 of 25

With the Symantec Endpoint Protection DVD in hand, how can you migrate from a third-party solution to SEP 12.1?

Running a third-party cleanup tool before installing the SEP 12.1 installation package

Setting a sweep task in the Administration console

Including the third-party cleanup tool as part of the SEP 12.1 installation package

Setting an existing SEP client as unmanaged detector

1 out of 1

Question 22 of 25

What is the main benefit of Shared Insight Cache (SIC)?

Reduces memory usage

Reduces I/O

Reduces TCO

Reduces disk space usage

1 out of 1

Question 23 of 25

Your customer needs to set USB drives as read-only, which policy component must the customer configure?

Use device control with a class ID

Use device control with a device ID

Use application control to log read files on a USB drive

Use an application control preconfigured template

1 out of 1

Question 24 of 25

Which protection technology is present on a SEP for Mac client?

Insight

Antivirus and Antispyware

Device control

SONAR

1 out of 1

Question 25 of 25

After a client is deployed, and you trigger a reboot from the Reporting page, where can you observe if the client received your order?

Report > Computer Status > Deployment Report

Client > Client System View

Monitor > Log > System Logs > Server Activity Monitor > Command Status

1 out of 1

相关主题
文本预览
相关文档 最新文档