SALES PLUS ASSESMENT SCORE REPORT
ASSESMENT:Symantec Endpoint Protection 12.1 (September 2012) Sales Plus Assessment DATE: Sunday, November 17,
2013
PASSING SCORE:75% YOUR
SCORE: 100%
GRADE:PASS
Note Regarding Score: Assessment scores normally post to CertTracker within 2-3 business days. As soon as your assessment score posts to CertTracker, you will receive an automated message via email; if you are new to CertTracker, you will receive an account activation notice as well.
Note Regarding Certificate: Once your passing assessment score has posted to CertTracker, you will receive an electronic certificate via email within one business day.
Contact Information: If you have questions or need assistance, please
contact global_exams@https://www.doczj.com/doc/5b6538440.html, Please note that assessment scores normally post to CertTracker within 2-3 business days. Your score will not be available in CertTracker before this time.
This information below is provided to assist you with identifying areas where additional training may be needed.
If you wish to save your score report please use print screen or a screen capture program.
Results by topic:
Question 1 of 25
Which statement about IT Analytics is true?
ITA works with the embedded database.
ITA requires the user to know about OLAP to extract reports.
ITA allows for users to create multidimensional ad-hoc reports.
ITA requires add on licensing to be purchased.
1 out of 1
Question 2 of 25
On the Insight reputation scoring system, which status would receive a file with the following attributes: New, Low prevalence, No records of malicious activity?
Highly Untrusted
Unproven
Trusted
Community Trusted
1 out of 1
Question 3 of 25
In order to remote push a SEP package to a Windows 8 machine, which 3 steps must be performed?
Disable UAC for local users, enable the administrator account, and disable Windows firewall.
Enable the administrator account, disable the remote registry service, and disable the Windows firewall.
Disable UAC for remote users, enable the share IPC$, and configure Windows firewall to allow SMB traffic.
Disable UAC for remote users, enable remote registry service, and disable Windows firewall.
1 out of 1
Question 4 of 25
Match this definition to one of the terms below: The period of time during which a VM is not fully patched or up to date.
Instant on gap
Temporary rogue client
Template cloning period
Missed event window
1 out of 1
Question 5 of 25
Insight supports a wide range of protection technologies. Which technology does Insight help in increasing performance?
Download protection
Antivirus and Antispyware
IPS
SONAR
1 out of 1
To which account type does Site rights apply?
Active Directory
System Administrator
Administrator
Limited Administrator
1 out of 1
Question 7 of 25
EICAR is a virus test file, why does IPS find it as an attack?
Insight detects the file as untrustworthy.
SONAR monitors the Internet browser and passes the result to IPS.
Security response added a signature for EICAR to the IPS engine.
This is a false positive
1 out of 1
Question 8 of 25
What should you do just before running VIE?
Install .Net framework 4.0.
Install SEP 12.1.
Run a full scan with the latest definitions.
Create a backup of your VM.
1 out of 1
What is the key concern with antivirus scanning on a virtual environment?
Speed
Duration
Bottleneck
Efficacy
1 out of 1
Question 10 of 25
Which database engine is supported with SEP 12.1.2?
SQL 2000 SP3
SQL 2012
Oracle 9i
MySQL 5
1 out of 1
Question 11 of 25
With the rise of unique malware variants, which protection technology is best suited to prevent zero-day threats?
Insight
Device control
Firewall
Antivirus and antispyware
1 out of 1
Match the feature to the following description: Windows-based and hypervisor agnostic scan de-duplication agent.
VIE
vSIC
SIC
vShield Endpoint
1 out of 1
Question 13 of 25
To prevent high-profile false positives, which steps are taken by SONAR?
SONAR never deletes files that are part of the operating system.
SONAR never monitors Windows DLLs.
SONAR never inspects files signed by trusted class-3 co-signers.
SONAR never injects processes signed by Symantec.
1 out of 1
Question 14 of 25
According to the Internet Threat Report, Volume 17, how many unique malware variant were discovered in 2011?
286 000 000
303 000 000
403 000 000
486 000 000
1 out of 1
Question 15 of 25
In the vSphere ecosystem, which software component is managing the creation of VM from a template?
vSphere client
vShield Endpoint
vCenter
ESXi
1 out of 1
Question 16 of 25
A customer has 2500 endpoints across two sites with a high-bandwidth Internet access/WAN. The customer wants to use ITAnalytics for advanced reporting and to reduce hardware costs. Which database and site topology do you advise?
Single site, SQL
Distributed, SQL
Distributed, Embedded
Single site, Embedded
1 out of 1
Question 17 of 25
A customer wants to use vSIC, but the VM the customer wants to protect is not appearing on the vShield Manager console. What is missing?
vShield drivers, which are part of the VMware tools.
The SEP 12.1 client
The customer did not install the vCenter License.
The customer did not install the Symantec Security Virtual Appliance (SVA).
1 out of 1
Question 18 of 25
In which folder on the SEPM Web server do you create the demo folder to demo the protection technologies where EICAR and Cloud Car are hosted?
Under C:\Program Data\Symantec\Symantec Endpoint Protection Manager\intetpub
Under C:\Program Files\Symantec\Symantec Endpoint Protection Manager\inetpub
Under C:\Program Files\Symantec\Symantec Endpoint Protection Manager\Data\outbox
Under C:\Program Data\Symantec\Symantec Endpoint Protection Manager\
1 out of 1
Question 19 of 25
When testing download protection, what is mandatory for the demo to work as planned?
Administrator rights
Firewall
Internet access
Fixed IP
1 out of 1
Question 20 of 25
An enterprise customer has clients with an over-deployed license, which of these statements is correct?
The over-deployed clients can submit a reputation report to Insight.
The over-deployed clients cannot receive new definitions.
The administrator will receive e-mails and pop-ups about over-deployed clients.
The administrator will be prompted to uninstall the over-deployed clients.
1 out of 1
Question 21 of 25
With the Symantec Endpoint Protection DVD in hand, how can you migrate from a third-party solution to SEP 12.1?
Running a third-party cleanup tool before installing the SEP 12.1 installation package
Setting a sweep task in the Administration console
Including the third-party cleanup tool as part of the SEP 12.1 installation package
Setting an existing SEP client as unmanaged detector
1 out of 1
Question 22 of 25
What is the main benefit of Shared Insight Cache (SIC)?
Reduces memory usage
Reduces I/O
Reduces TCO
Reduces disk space usage
1 out of 1
Question 23 of 25
Your customer needs to set USB drives as read-only, which policy component must the customer configure?
Use device control with a class ID
Use device control with a device ID
Use application control to log read files on a USB drive
Use an application control preconfigured template
1 out of 1
Question 24 of 25
Which protection technology is present on a SEP for Mac client?
Insight
Antivirus and Antispyware
Device control
SONAR
1 out of 1
Question 25 of 25
After a client is deployed, and you trigger a reboot from the Reporting page, where can you observe if the client received your order?
Report > Computer Status > Deployment Report
Client > Client System View
Monitor > Log > System Logs > Server Activity Monitor > Command Status
1 out of 1