Exam 5: Symantec Messaging Gateway 10.5 Technical Assessment (Broadcom)
Exam 1: Administration of Symantec Endpoint Protection 14 (Broadcom)165 Questions
Exam 2: Administration of Symantec Email Security.cloud (v1)113 Questions
Exam 3: Administration of Symantec Data Loss Prevention 12 (Broadcom)98 Questions
Exam 4: Administration of Symantec ProxySG 6.7138 Questions
Exam 5: Symantec Messaging Gateway 10.5 Technical Assessment (Broadcom)409 Questions
Select questions type
What needs to be enabled for the Explicit HTTP service to be able to hand off SSL traffic? (Choose the best answer.)
(Multiple Choice)
4.8/5
(34)
What is a component of a proxy service listener? (Choose the best answer.)
(Multiple Choice)
4.7/5
(35)
What Windows Task Scheduler task created by the Notification Server will improve the performance of tables in the CMDB, when solving database performance related issues?
(Multiple Choice)
4.7/5
(34)
What is the Availability Service Level Agreement (SLA) for Email Security.cloud?
(Multiple Choice)
4.9/5
(24)
You are responsible for managing Veritas Enterprise Administrator. You are in the process of creating a new disk group. You first initialize an unitialized disk and then create a new disk group using the disk you initialized. You want to ensure that this disk is mounted when you boot the system. What should you do next?
(Multiple Choice)
4.9/5
(41)
A DLP administrator is writing one policy to block sensitive data from being copied to removable media. The administrator is applying two response rules to the policy: 'Endpoint Prevent: Notify' and 'Endpoint Prevent: Block'. Why are some copies blocked while others are only notified?
(Multiple Choice)
4.9/5
(36)
Which structure records are stored in the private region?(Each correct answer presents part of the solution. Select three.)
(Multiple Choice)
4.8/5
(41)
How should an administrator export all policies from a test environment to a production environment?
(Multiple Choice)
4.8/5
(36)
Which National Institute of Standards and Technology (NIST) cybersecurity function includes Risk Assessment or Risk Management Strategy?
(Multiple Choice)
4.9/5
(46)
Which action should an Incident Responder take to remediate false positives, according to Symantec best practices?
(Multiple Choice)
4.9/5
(43)
A DLP administrator is creating a role that contains an incident access condition that restricts users from viewing specific incidents. Which two conditions can the administrator specify when creating the incident access condition in a role? (Select two.)
(Multiple Choice)
5.0/5
(33)
You work in a Server Operations Center (SOC), and you are required to track the status of the VxVM tasks in progress on a UNIX server. Another member of the administration team is scheduled to execute VxVM changes; you are also responsible for tracking the progress of those changes. In addition, you are required to escalate any issues with the change to the team member. How would you execute this task?
(Multiple Choice)
4.8/5
(40)
An Oracle Enterprise database is having I/O performance issues. You need to determine the exact location of a data block on a disk that is a hot spot slowing down I/O performance. Which feature of Storage Foundation 5.0 for Oracle will you use to perform this task?
(Multiple Choice)
4.8/5
(40)
You administer storage for multiple hosts supporting a large OLTP application. Host Mkt operates both within the secure intranet, and host Store operates in a DMZ environment. Store stages detailed transaction logs on a volume named s_detail in a disk group named s_data. You need to deliver large batches of transaction data history from host Store to host Mkt for market analysis, and to receive the results of that analysis, as part of a weekly routine. To deliver sales history to the marketing host, what sequence of actions must you carry out? Place the following actions in order. 1. Use vxdg to deport the snapshot volume's disk group from host Store. 2. Use vxdg to import the snapshot volume into host Mkt. 3. Use vxsnap to create a snapshot of s_detail on s_data. 4. Use the vxsnap command to enable FastResync on s_detail. 5. Use vxdg to split the snapshot volume away from s_data, into a separate disk group.
(Multiple Choice)
5.0/5
(45)
An Incident Responder launches a search from ATP for a file hash. The search returns the results immediately. The responder reviews the Symantec Endpoint Protection Manager (SEPM) command status and does NOT see an indicators of compromise (IOC) search command. How is it possible that the search returned results?
(Multiple Choice)
4.9/5
(42)
When does the ProxySG establish an Schannel? (Choose the best answer.)
(Multiple Choice)
4.8/5
(38)
Which type of assessment is unavailable within Phishing Readiness?
(Multiple Choice)
4.9/5
(45)
There are four volumes that are striped across five disks. One of the disks fails. From how many volumes will you restore the data?
(Multiple Choice)
4.8/5
(36)
Which access credentials does an ATP Administrator need to set up a deployment of ATP: Endpoint, Network, and Email?
(Multiple Choice)
4.8/5
(41)
Showing 181 - 200 of 409
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)