2013年6月5日星期三

Symantecの250-511試験の勉強の資料

弊社が提供した部分の資料を試用してから、決断を下ろしてください。もし弊社を選ばれば、100%の合格率を保証でございます。


Pass4TestはIT試験問題集を提供するウエブダイトで、ここによく分かります。最もよくて最新で資料を提供いたします。こうして、君は安心で試験の準備を行ってください。弊社の資料を使って、100%に合格を保証いたします。もし合格しないと、われは全額で返金いたします。


Pass4Test を選択して100%の合格率を確保することができて、もし試験に失敗したら、Pass4Testが全額で返金いたします。


Pass4TestのSymantecの250-511試験トレーニング資料を手に入れたら、我々は一年間の無料更新サービスを提供します。それはあなたがいつでも最新の試験資料を持てるということです。試験の目標が変わる限り、あるいは我々の勉強資料が変わる限り、すぐに更新して差し上げます。あなたのニーズをよく知っていていますから、あなたに試験に合格する自信を与えます。


Pass4TestのSymantecの250-511試験問題資料は質が良くて値段が安い製品です。我々は低い価格と高品質の模擬問題で受験生の皆様に捧げています。我々は心からあなたが首尾よく試験に合格することを願っています。あなたに便利なオンラインサービスを提供して、Symantec 250-511試験問題についての全ての質問を解決して差し上げます。


試験番号:250-511問題集

試験科目:Symantec 「Administration of Symantec(TM) Data Loss Prevention 11」

Pass4Testは当面最新のSymantecの250-511の認証試験の準備問題を提供している認証された候補者のリーダーです。弊社の資源はずっと改訂され、アップデートされていますから、緊密な相関関係があります。Symantecの250-511の認証試験を準備しているあなたは、自分がトレーニングを選んで、しかも次の問題を受かったほうがいいです。弊社の試験問題はほとんど毎月で一回アップデートしますから、あなたは市場で一番新鮮な、しかも依頼できる良い資源を得ることができることを保証いたします。


購入前にお試し,私たちの試験の質問と回答のいずれかの無料サンプルをダウンロード:http://www.pass4test.jp/250-511.html


NO.1 A Data Loss Prevention administrator notices that several errors occurred during a Network Discover
scan. Which report can the administrator use to determine exactly which errors occurred and when?
A. Discover Incident report sorted by target name and scan
B. Full Activity report for that particular scan
C. Server Event report from Server Overview
D. Full Statistics report for that particular scan
Answer: B

Symantec   250-511   250-511参考書   250-511認証試験

NO.2 To manually troubleshoot DLP Agent issues, the database and log viewer tools must be executed in
which location?
A. in the same location as the dcs.ead file location
B. in the same location as the cg.ead file location
C. in the same location as the ks.ead file location
D. in the same location as the is.ead file location
Answer: C

Symantec   250-511   250-511認定証

NO.3 Where should the Network Discover detection server be placed in a corporate network architecture?
A. inside the DMZ
B. on the same virtual LAN as the proxy server
C. inside the corporate network
D. on the same switch as the Oracle database server
Answer: C

Symantec   250-511   250-511   250-511

NO.4 Which two functions of the communications architecture ensure that the system will automatically
recover if a network connectivity failure occurs between the detection servers and the Enforce Server?
(Select two.)
A. Oracle database backup
B. detection server autonomous monitoring
C. Enforce Server offline alert notification
D. detection server incident queuing
E. detection server alert archiving
Answer: B,D

Symantec   250-511認定証   250-511認定資格   250-511

NO.5 Which Network Discover option is used to determine whether confidential data exists without having to
scan the entire target?
A. Byte Throttling
B. File Throttling
C. Match Thresholds
D. Inventory Mode Scanning
Answer: D

Symantec問題集   250-511   250-511   250-511   250-511認定資格

NO.6 Which two remediation actions are available for Network Protect? (Select two.)
A. Copy
B. Move
C. Block
D. Rename
E. Quarantine
Answer: A,E

Symantec認証試験   250-511   250-511   250-511認定資格

NO.7 Which DLP Agent task is unique to the Symantec Management Platform and is unavailable through
the Enforce console?
A. Change Endpoint server
B. Restart agent
C. Pull agent logs
D. Set log level
Answer: D

Symantec   250-511   250-511認証試験   250-511認定証

NO.8 What is a feature of keyword proximity matching?
A. It will match on whole keywords only.
B. It has a maximum distance between keywords of 99.
C. It only matches on message body.
D. It evaluates each keyword pair independently.
Answer: D

Symantec   250-511   250-511

NO.9 What are two benefits of the Symantec Data Loss Prevention 11 security architecture? (Select two.)
A. Communication is initiated by the detection servers inside the firewall.
B. SSL communication is used for user access to the Enforce Platform.
C. Endpoint Agent to Endpoint Server communication uses the Triple Data Encryption Standard (Triple
DES).
D. Confidential information captured by system components is stored using Advanced Encryption
Standards (AES) symmetric keys.
E. All indexed data uploaded into the Enforce Platform is protected with a two-way hash.
Answer: B,D

Symantec認定試験   250-511問題集   250-511認定証   250-511   250-511

NO.10 The database is full and the Incident Persister is unable to process incidents. Which two file types
could be present in Vontu/protect/incidents? (Select two.)
A. .idx
B. .edc
C. .idc
D. .inc
E. .bad
Answer: C,E

Symantec認定試験   250-511参考書   250-511問題集   250-511参考書

NO.11 Which two policy management actions can result in a reduced number of incidents for a given traffic
flow? (Select two.)
A. adding additional component matching to the rule
B. adding data owner exceptions
C. deploying to additional detection servers
D. increasing condition match count
E. adding additional severities
Answer: B,D

Symantec参考書   250-511問題集   250-511認定資格

NO.12 A user is unable to log in as sysadmin. The Data Loss Prevention system is configured to use Active
Directory authentication. The user is a member of two roles, sysadmin and remediator. How should the
user log in to the user interface in the sysadmin role?
A. sysadmin\username@domain
B. sysadmin\username
C. domain\username
D. sysadmin\username\domain
Answer: B

Symantec   250-511過去問   250-511問題集

NO.13 Which product provides support for the Citrix XenApp virtualization platform?
A. Endpoint Prevent
B. Network Discover
C. Network Protect
D. Network Prevent
Answer: A

Symantec過去問   250-511練習問題   250-511   250-511   250-511

NO.14 What must a policy manager do when working with Exact Data Matching (EDM) indexes?
A. re-index large data sources on a daily or weekly basis
B. index the original data source on the detection server
C. deploy the index only to specific detection servers
D. create a new data profile if data source schema changes
Answer: D

Symantec   250-511   250-511

NO.15 A company needs to scan all of its file shares on a weekly basis to make sure sensitive data is being
stored correctly. The total volume of data on the file servers is greater than 1 TB. Which approach will
allow the company to quickly scan all of this data on a weekly basis?
A. run an initial complete scan of all the file shares, then modify the scan target to add date filters and
exclude any files created or modified before the initial scan was run
B. run an initial complete scan of all the file shares, then modify the scan target to an incremental scan
type
C. create a separate scan target for each file share and exclude files accessed before the start of each
scan
D. run an initial complete scan of all file shares, create a summary report of all incidents created by the
scan, then run weekly scans and compare incidents from weekly scans to incidents from the complete
scan
Answer: B

Symantec認定資格   250-511   250-511認定証   250-511認証試験

NO.16 An administrator is running a Discover Scanner target scan and the scanner is unable to communicate
back to the Discover Server. Where will the files be stored?
A. Discover Server incoming folder
B. scanner's outgoing folder
C. scanner's incoming folder
D. Enforce incident persister
Answer: B

Symantec練習問題   250-511   250-511   250-511過去問   250-511

NO.17 How can an administrator validate that once a policy is updated and saved it has been enabled on a
specific detection server?
A. check the status of the policy on the policy list page
B. check to see whether the policy was loaded under System > Servers > Alerts
C. check the policy and validate the date and time it was last updated
D. check to see whether the policy was loaded under System > Servers > Events
Answer: D

Symantec過去問   250-511認定試験   250-511   250-511   250-511認定試験

NO.18 A role is configured for XML export and a user executes the export XML incident action. What must be
done before history information is included in the export?
A. A remediator must take an action on the incident.
B. History must be enabled as a tab or panel in the incident snapshot layout.
C. Incident history must be enabled in the user's role.
D. The manager.properties must be configured for XML export.
Answer: C

Symantec   250-511練習問題   250-511認証試験   250-511

NO.19 A divisional executive requests a report of all incidents generated by a particular region, summarized
by department. What must be populated to generate this report?
A. remediation attributes
B. sender correlations
C. status groups
D. custom attributes
Answer: D

Symantec   250-511認定試験   250-511認定資格

NO.20 After installing several new DLP Agents, the Data Loss Prevention administrator discovers that none of
the endpoint agents are appearing on the Agent Overview page. After refreshing the page several times,
and determining that the equipment is powered on and connected to the network, the Agent Overview
page still fails to display the new agents. What is a possible cause for this issue?
A. The DLP Agents need to be added manually through the Symantec Management Platform.
B. The DLP Agents were installed with the incorrect Endpoint server IP address.
C. The assigned Endpoint server needs to be recycled in order to detect the new DLP Agents.
D. The Endpoint Location is set to "Manually" instead of "Automatically" in the Enforce user interface.
Answer: B

Symantec   250-511   250-511問題集   250-511参考書   250-511認定試験

IT業の多くの人がいくつか認証試験にパスしたくて、それなりの合格証明書が君に最大な上昇空間を与えます。この競争の激しい業界でとんとん拍子に出世させるのはSymantecの250-511認定試験ですが、簡単にパスではありません。でもたくさんの方法があって、最も少ない時間をエネルギーをかかるのは最高です。


没有评论:

发表评论