現在の社会の中で優秀な人材が揃てIT人材も多く、競争もとても大きくて、だから多くのIT者はにIT関する試験に参加するIT業界での地位のために奮闘しています。250-311試験はSymantecの一つ重要な認証試験で多くのIT専門スタッフが認証される重要な試験です。
君はほかのサイトや書籍もブラウズ するがもしれませんが、弊社の関連の学習資料と比較してからPass4Testの商品の範囲が広くてまたネット上でダウンロードを発見してしまいました。Pass4Testだけ全面と高品質の問題集があるのではPass4Testの専門家チームが彼らの長年のIT知識と豊富な経験で研究してしました。そして、Pass4Testに多くの受験生の歓迎されます。
Pass4Testの商品はIT業界の専門家が自分の豊かな知識と経験を利用して認証試験に対して研究出たので品質がいいの試験の資料でございます。受験者がPass4Testを選択したら高度専門の試験に100%合格することが問題にならないと保証いたします。
試験番号:250-311問題集
試験科目:Symantec 「Administration of Symantec Endpoint Protection 11.0 for Windows」
あなたはまだ何を待っているのですか。機会が一回だけありますよ。いまSymantecの250-311試験問題のフルバージョンを取ることができます。Pass4Testというサイトをクッリクしたらあなたの願いを果たせます。あなたが最も良いSymantecの250-311試験トレーニング資料を見つけましたから、Pass4Testの問題と解答を安心に利用してください。きっと試験に合格しますよ。
購入前にお試し,私たちの試験の質問と回答のいずれかの無料サンプルをダウンロード:http://www.pass4test.jp/250-311.html
NO.1 A company has a large sales force who travel with laptops. They want to block USB
access on the laptops when they are disconnected from the corporate network.
Which two things are required to achievethis? (Choose two.)
A. multiple sites
B. multiple locations
C. firewall policy
D. device control policy
E. host integrity policy
Answer: BD
Symantec 250-311認定試験 250-311 250-311 250-311
NO.2 THE DISCLOSURE TO YOU OF THIS EXAMINATION ("THEEXAM") AND ANY
ACCOMPANYING EXAMINATION MATERIALS AND ANY DERIVATIVES THEREOF
(COLLECTIVELY REFERRED TO AS THE "EXAM MATERIALS") IS SUBJECT TO THE
TERMSAND CONDITIONS OF THE SYMANTEC CORPORATION CONFIDENTIALITY
AGREEMENT PROVIDED HEREIN. BY CLICKING ON THE "START" BUTTON IN
RESPONSE TO THE ACCEPTANCE QUERY, OR BY OTHERWISE TAKING THE
EXAMINATION, YOU ARE CONSENTING TO BE BOUND BY THIS AGREEMENT. BY
CLICKING ON THE "EXIT" BUTTON, YOU CHOOSE NOT TO AGREE AND WILL BE LET OUT OF THE
EXAM.
IF THESE TERMSARE CONSIDERED AN OFFER, ACCEPTANCE IS EXPRESSLY
LIMITED TO THESE TERMS.
SYMANTEC CORPORATION CONFIDENTIALITY AGREEMENT
This is an agreement ("Agreement") between You and Symantec Corporation that sets forth the terms and
conditions of your use and disclosure of the Exam Materials.
You hereby understand, acknowledge, and agree:
1.That Symantec Corporation spends substantial sums of time and money in developing and
administering its Exam Materials and labs and carefully guards their integrity and
confidentiality;
2.That the questions and answers of the Exam are the exclusiveand confidential property of Symantec
Corporation and are protected by Symantec Corporation's intellectual property rights;
3.That You may not disclose the Exam questions or answers or discuss any of the content of the Exam
Materials with any person, without prior written approval of Symantec Corporation;
4.Not toremovefromtheexamination roomany ExamMaterialsof any kind providedto Youor
any other material related to the Exam, including, without limitation, any notes or calculations;
5.Not to copy or attempt to make copies (written, photocopied, or otherwise) of any Exam
Material, including, without limitation, any exam questions or answers;
6.Not to sell, license, distribute, giveaway, or obtain from any other source other Symantec Corporation
the Exam materials, questions or Answers.
You hereby acknowledge and agree that violation of any of these provisions will cause
irreparable harm to Symantec Corporation for which monetary remedies may be inadequate, and that
Symantec Corporation shall be entitled, without waiving any other rights or remedies, to take all
appropriate actions to remedy or prevent such disclosure or misuse, including obtaining an immediate
injunction. Neither this Agreement nor any right granted hereunder shallbe assignable or otherwise
transferableby You. ThisAgreement maybe modifiedonlyby a writing signed by both parties. This
Agreement shall be construed in accordance with the laws of the State of California, without giving effect
to any choice of law rule. This Agreement represents the entire Agreement of the parties hereto pertaining
to the subject matter of this
Agreement, and supersedes any and all prior oral discussions and/or written correspondence or
agreements between the parties with respect thereto.
If you ACCEPT the termsand conditions of this Agreement, click 'Yes, I agree.', and begin this exam. If
you DO NOT ACCEPT this Agreement, you must click 'No, I do not agree.', and will not be able to proceed
with this exam.
Answer.pending
NO.3 Which page is used to create login accounts to the Symantec Endpoint Protection
Manager console?
A. Policies
B. Home
C. Admin
D. Clients
Answer: A
Symantec認証試験 250-311 250-311認定資格 250-311 250-311
NO.4 An administrator believes that client computers are running different software versions of Symantec
Endpoint Protection.
Which report type shows which client computers are running different software versions?
A. Application and Device Control Report
B. System Report
C. Compliance Report
D. Computer Status Report
Answer: D
Symantec過去問 250-311認定資格 250-311認定証 250-311過去問 250-311
NO.5 Which fivecomponents are incorporated in Symantec Endpoint Protection 11.0? (Choose five.)
A. antispam
B. application and device control
C. full disk encryption
D. host integrity
E. antivirus
F. antispyware
G. content filtering
H. intrusion prevention
I. client firewall
J. asset management
Answer: BEFHI
Symantec認定試験 250-311過去問 250-311
NO.6 In the Symantec Endpoint Protection Manager console, where do you modifyreplication?
A. Admim > Servers > Server Properties > Directory Servers
B. Admin > Servers > Local Site > Replication Partner
C. Policies > Management Server Lists > Replication
D. Admin > Servers > Database > Tasks
Answer: B
Symantec認定資格 250-311 250-311認定証 250-311過去問
NO.7 What controls access from one network segment to another?
A. hub
B. MTA
C. sensor
D. firewall
Answer: D
Symantec 250-311 250-311 250-311認定資格 250-311
NO.8 Lifeline Supply Company wants to reduce or eliminatethe HelpDesk callsthey receivedue to end users
modifying, moving, or deleting configuration files.
Which component of Symantec Endpoint Protection will allow the IT administrator to prevent users from
altering configuration files?
A. TruScan ProactiveThreat Scan
B. Device Control
C. Application Control
D. Host Integrity
Answer: C
Symantec過去問 250-311 250-311認証試験
NO.9 What is one reason for disabling learned applications?
A. Learned applications can often expose usernames and passwords.
B. Learned applications require promiscuous mode.
C. Learned applications are often legitimate programs.
D. Learned applications are illegal in some countries.
Answer: D
Symantec 250-311 250-311 250-311
NO.10 THE DISCLOSURE TO YOU OF THIS EXAMINATION ("THE EXAM") AND ANY
ACCOMPANYING EXAMINATION MATERIALS AND ANY DERIVATIVES THEREOF
(COLLECTIVELY REFERRED TO AS THE "EXAM MATERIALS") IS SUBJECT TO THE
TERMSAND CONDITIONS OF THE SYMANTEC CORPORATION CONFIDENTIALITY
AGREEMENT PROVIDED HEREIN. BY CLICKING ON THE "START" BUTTON IN
RESPONSE TO THE ACCEPTANCE QUERY, OR BY OTHERWISE TAKING THE
EXAMINATION, YOU ARE CONSENTING TO BE BOUND BY THIS AGREEMENT. BY
CLICKING ON THE "EXIT" BUTTON, YOU CHOOSE NOT TO AGREE AND WILL BE LET OUT OF THE
EXAM.
IF THESE TERMSARE CONSIDERED AN OFFER, ACCEPTANCE IS EXPRESSLY
LIMITED TO THESE TERMS.
SYMANTEC CORPORATION CONFIDENTIALITY AGREEMENT
This is an agreement ("Agreement") between You and Symantec Corporation that sets forth the terms and
conditions of your use and disclosure of the Exam Materials.
You hereby understand, acknowledge, and agree:
1.That Symantec Corporation spends substantial sums of time and money in developing and
administering its Exam Materials and labs and carefully guards their integrity and
confidentiality;
2.That the questions and answers of the Exam are the exclusiveand confidential property of Symantec
Corporation and are protected by Symantec Corporation's intellectual property rights;
3.That You may not disclose the Exam questions or answers or discuss any of the content of the Exam
Materials with any person, without prior written approval of Symantec Corporation;
4.Not toremovefromtheexamination roomany ExamMaterialsof any kind providedto Youor
any other material related to the Exam, including, without limitation, any notes or calculations;
5.Not to copy or attempt to make copies (written, photocopied, or otherwise) of any Exam
Material, including, without limitation, any exam questions or answers;
6.Not to sell, license, distribute, giveaway, or obtain from any other source other Symantec
Corporation the Exam materials, questions or answers.
You hereby acknowledge and agree that violation of any of these provisions will cause
irreparable harm to Symantec Corporation for which monetary remedies may be inadequate, and that
Symantec Corporation shall be entitled, without waiving any other rights or remedies, to take all
appropriate actions to remedy or prevent such disclosure or misuse, including obtaining an immediate
injunction. Neither this Agreement nor any right granted hereunder shallbe assignable or otherwise
transferableby You. ThisAgreement maybe modifiedonlyby a writing signed by both parties. This
Agreement shall be construed in accordance with the laws of the State of California, without giving effect
to any choice of law rule. This Agreement represents the entire Agreement of the parties hereto pertaining
to the subject matter of this Agreement, and supersedes any and all prior oral discussions and/or written
correspondence or agreements between the parties with respect thereto. If you ACCEPT the termsand
conditions of this Agreement, click 'Yes, I agree.', and begin this exam. If you DO NOT ACCEPT this
Agreement, you must click 'No, I do not agree.', and will not be able to proceed with this exam.
Answer. pending
NO.11 Refer to the exhibit.
Inheritance is turned on for groups LLSCO, Group A, Laptops, and Group 2 (outlined).
Without turning inheritance off, which top level group must be modified to affect users in the Laptop
group?
A. Desktops
B. Laptops
C. Group 1
D. Group A
Answer: C
Symantec認定資格 250-311問題集 250-311認定資格
NO.12 Which two statements are true about Symantec Endpoint Protection TruScan Proactive Threat Scan?
(Choose two.)
A. It inspects encrypted network traffic.
B. It evaluates process behavior.
C. It uses malicious code detection signatures.
D. It blocks attackers' IP addresses.
E.It detects unknown threats.
Answer: BE
Symantec練習問題 250-311過去問 250-311認証試験 250-311
NO.13 What are the three configurable actions in TruScan ProactiveThreat Scan? (Choose three.)
A. log suspect process only
B. set a public SNMP trap
C. quarantine suspect process
D. terminate the suspect process
E. generate dump of system state
F. suspend the suspect process
Answer: ACD
Symantec過去問 250-311 250-311練習問題 250-311認証試験 250-311参考書
NO.14 Which Network Threat Protection technologies of the SymantecEndpoint Protection client provide the
primary protection layers against network attacks?
A. ProactiveThreat Protection and Network Access Control
B. ProactiveThreat Protection and Client Firewall
C. Intrusion Prevention and Client Firewall
D. Client Firewall and Network Access Control
Answer: C
Symantec練習問題 250-311 250-311問題集 250-311 250-311
NO.15 A computer is configured in Mixed Control mode. The administrator creates and applies a firewall policy
to the computer that has a rule that allows FTP trafficabove the blue line and another rule that blocks
LDAP traffic below the blue line. On the computer, local rules are created to allow LDAP trafficand block
FTP.
Which traffic flow behavior should be expected on the local computer?
A. Both FTP and LDAP trafficare allowed.
B. Both FTP and LDAP trafficare blocked.
C. FTP is blocked and LDAP is allowed.
D. FTP is allowed and LDAP is blocked.
Answer: A
Symantec問題集 250-311 250-311 250-311問題集 250-311練習問題
NO.16 Which label is given to a program or algorithm that replicates itself overa computer
network and usually performs malicious actions?
A. virus
B. zero-day exploit
C. spam
D. worm
Answer: D
Symantec 250-311 250-311過去問 250-311
NO.17 The administrators at Lifeline Supply Company have a manufacturing facility that runs
three shifts. Employees at the facility must share computers. The administrators want the
ability to apply different policies/configurations for each shift.
How can the administrator configure the environment to allow policies to be applied to each shift?
(Choose two.)
A. create one group for all computers in the facility
B. create one group for all users in the facility
C. create one group for all computers on each shift
D. create one group for all users on each shift
E. switch the clients to computer mode
F. switch the clients to user mode
Answer: DF
Symantec 250-311認定資格 250-311過去問 250-311過去問
NO.18 The Symantec Endpoint Protection Manager supports the use of which database solutions?
(Choose two.)
A. Microsoft SQL Server 2000
B. MySQL Server 2005
C. Microsoft SQL Server 2005
D. Oracle Database 11g
E. Oracle Database 9i
Answer: AC
Symantec 250-311 250-311認定資格 250-311認定資格
NO.19 Lifeline Supply Company found during a recent audit that the current security solution for
theirdesktops and servers missed several rootkitswithin their environment. These rootkits have
compromised several company computers.
Which protection technology in Symantec Endpoint Protection could remediate these rootkits?
A. Host Integrity
B. Antivirus and Antispyware Protection
C. Network Threat Protection
D. Application and Device Control
Answer: B
Symantec問題集 250-311過去問 250-311認証試験 250-311認定試験
NO.20 Where can you edit a non-shared policy?
A. Clients
B. Monitors
C. Home
D. Admin
Answer: A
Symantec認証試験 250-311 250-311
IT 職員のそれぞれは昇進または高給のために頑張っています。これも現代社会が圧力に満ちている一つの反映です。そのためにSymantecの250-311認定試験に受かる必要があります。適当なトレーニング資料を選んだらこの試験はそんなに難しくなくなります。Pass4TestのSymantecの250-311試験トレーニング資料は最高のトレーニング資料で、あなたの全てのニーズを満たすことができますから、速く行動しましょう。
没有评论:
发表评论