Exam 5: Symantec Messaging Gateway 10.5 Technical Assessment (Broadcom)

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which two widgets can an Incident Responder use to isolate breached endpoints from the Incident details page? (Choose two.)

(Multiple Choice)
4.8/5
(33)

The chief information security officer (CISO) is responsible for overall risk reduction and develops high-level initiatives to respond to security risk trends. Which report will be useful to the CISO?

(Multiple Choice)
4.9/5
(35)

A network administrator needs to be notified if someone attempts to tamper with or shut down the VPN connection on an iPad or iPhone. Which product should the administrator use to configure the notification alert?

(Multiple Choice)
4.9/5
(40)

What does a Quarantine Firewall policy enable an ATP Administrator to do?

(Multiple Choice)
4.8/5
(32)

While performing a VxVM operation, you discover that the disk group configuration has become corrupt. You want to check the changes in the VxVM configuration data and automatically record any configuration changes that occur. What would you do in this situation?

(Multiple Choice)
4.9/5
(38)

Where does ProxySG object caching usually result in the most bandwidth savings? (Choose the best answer.)

(Multiple Choice)
4.9/5
(36)

Which RAID-levels are the parts of Data Redundancy layout? (Each correct answer presents part of the solution. Select three.)

(Multiple Choice)
4.9/5
(34)

A DLP administrator needs to inspect HTTP traffic using a Network Monitor, including data pushed up to the web and data pulled down from the web. Which configuration changes should the administrator make under the advanced server settings to include all cases?

(Multiple Choice)
4.8/5
(41)

A large company has 150,000 endpoints with 12 SEP sites across the globe. The company now wants to implement ATP: Endpoint to improve their security. However, a consultant recently explained that the company needs to implement more than one ATP manager. Why does the company need more than one ATP manager?

(Multiple Choice)
4.9/5
(38)

What is the importance of selecting the appropriate content type, when creating a list for Data Protection policy?

(Multiple Choice)
4.8/5
(41)

In System Overview, the status of a detection server is shown as 'unknown'. Examination of the detection server reveals all Vontu services are running. Which port is blocked and causing the server to be in the 'unknown' state?

(Multiple Choice)
4.8/5
(38)

You are auditing a current storage environment that is utilizing storage tiering. You will use the information gained from the audit in setting up policies for this tiered storage environment. When assigning the policy, you want to take into account applications that run concurrently that compete for I/O resources when data is placed on separate storage devices with separate access paths. Which policy factor should you use for the above scenario?

(Multiple Choice)
4.8/5
(35)

An incident responder is viewing a discover incident snapshot and needs to determine which information to provide to the next level responder. Which information would be most useful in assisting the next level responder with data clean-up?

(Multiple Choice)
4.7/5
(39)

An administrator is configuring an approved Endpoint device and adding it as an exception to a policy that blocks the transfer of sensitive data. Data transfers to these approved Endpoint devices are still being blocked. Which action should the administrator take to prevent the data transfers from being blocked?

(Multiple Choice)
4.9/5
(41)

What is the Email Security.cloud Service Level Agreement (SLA) for Anti-Malware false positives?

(Multiple Choice)
4.9/5
(40)

Which object can an administrator add to an organizational group?

(Multiple Choice)
4.7/5
(33)

Which IT Analytics component allows an administrator to create reports using drag and drop functionality?

(Multiple Choice)
4.8/5
(39)

Which website should an administrator browse to when solving Package Service Installation issues to check that the endpoint can resolve to the server?

(Multiple Choice)
4.7/5
(39)

What is the role of Vantage within the Advanced Threat Protection (ATP) solution?

(Multiple Choice)
4.8/5
(30)

You need to create a storage checkpoint that contains file system metadata and data blocks. You want to ensure that the storage checkpoint that you create can be mounted, accessed, and written in Veritas File System. The storage checkpoint that you create must represent an image of the active file system. Which type of storage checkpoint should you create to meet this goal?

(Multiple Choice)
4.8/5
(44)
Showing 241 - 260 of 409
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)