Exam 5: Symantec Messaging Gateway 10.5 Technical Assessment (Broadcom)
Exam 1: Administration of Symantec Endpoint Protection 14 (Broadcom)165 Questions
Exam 2: Administration of Symantec Email Security.cloud (v1)113 Questions
Exam 3: Administration of Symantec Data Loss Prevention 12 (Broadcom)98 Questions
Exam 4: Administration of Symantec ProxySG 6.7138 Questions
Exam 5: Symantec Messaging Gateway 10.5 Technical Assessment (Broadcom)409 Questions
Select questions type
A DLP administrator needs to have the Email Prevent Server return inspected emails to the same MTA from which it receives the message. In which mode should the Email Prevent server be configured?
(Multiple Choice)
4.8/5
(42)
You want to remove the disk named datadg01 from the disk group named datadg. You also want to remove the public and private regions from the disk. However, you want to retain the data stored on the disk. Which commands will you use to achieve this?
(Multiple Choice)
4.8/5
(47)
What is an "outbound route", as configured with Email Security.cloud?
(Multiple Choice)
4.7/5
(39)
Malware is currently spreading through an organization's network. An Incident Responder sees some detections in SEP, but there is NOT an apparent relationship between them. How should the responder look for the source of the infection using ATP?
(Multiple Choice)
4.7/5
(36)
An Incident Responder observes an incident with multiple malware downloads from a malicious domain. The domain in question belongs to one of the organization's suppliers. The organization needs access to the site to continue placing orders. ATP: Network is configured in Inline Block mode. How should the Incident Responder proceed?
(Multiple Choice)
4.9/5
(41)
What is the most efficient method for designing filters to remove unwanted traffic?
(Multiple Choice)
4.7/5
(30)
What is the earliest stage at which a SQL injection occurs during an Advanced Persistent Threat (APT) attack?
(Multiple Choice)
4.8/5
(29)
Which SEP technologies are used by ATP to enforce the blacklisting of files?
(Multiple Choice)
4.7/5
(33)
A system administrator has a large amount of data that is not being accessed on the company's storage devices. This excess amount of data is causing slow access to the active data. You want to set up automatic relocation of data so that data expires as per its defined age. What should you do?
(Multiple Choice)
4.8/5
(43)
You administer the Storage Foundation 5.0 environment in your organization. A particular file system displays some odd I/O characteristics. Before you proceed, you decide to take a look at the current I/O parameters. Which command will you use to print the current values of the I/O parameters?
(Multiple Choice)
4.9/5
(43)
Which component of the Symantec Management Platform attempts to choose a new communication path when the default communication method with the Notification Server is unavailable?
(Multiple Choice)
4.9/5
(34)
You are administering a Storage Foundation 5.0 server. You need to create a new mirrored-striped volume using the command line. What should you do?
(Multiple Choice)
4.8/5
(45)
Which rule will you use to discover disabled controllers failures in the Storage Foundation 5.0 environment?
(Multiple Choice)
4.8/5
(39)
Which item is available in the "Package Options" section of a software update policy?
(Multiple Choice)
4.8/5
(42)
When does Real Time Link Following scan a webpage for malware?
(Multiple Choice)
4.8/5
(47)
A DLP administrator needs to modify a Network Discover scan that has started. How should the administrator ignore files larger than 20 MB for the remaining shares?
(Multiple Choice)
4.7/5
(43)
Which two (2) design considerations will have the most impact on the efficiency and performance of the Microsoft SQL Server when an administrator is planning an IT Management Suite 8.1 implementation? (Choose two.)
(Multiple Choice)
4.8/5
(36)
You are attempting to install Storage Foundation 5.0 on a server that has SUSE Linux Enterprise Server 9.0 installed on it. When you initiate the installation, it fails. You must ensure that installing Storage Foundation 5.0 has minimum impact on the server. What should you do to install Storage Foundation 5.0 on the server?
(Multiple Choice)
4.9/5
(41)
An Incident Responder added a file's MD5 hash to the blacklist. Which component of SEP enforces the blacklist?
(Multiple Choice)
4.9/5
(30)
Which policies are required for the quarantine feature of ATP to work?
(Multiple Choice)
4.8/5
(35)
Showing 61 - 80 of 409
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)