Which two operating systems support detection policies only? (Select two.)
A. HP-UX 11i
B. VMWare ESX 4.1
C. Windows 2008 R2
D. VMWare ESXi 5.0
E. Red Hat Enterprise Linux 6
正解:A,D
質問 2:
Which feature can be configured using a detection policy?
A. Real-Time File Integrity Monitoring
B. De-escalation of Administrator Privileges
C. Restricting Access to Externally Connected Devices
D. Closing network back doors by defining ports to be monitored
正解:A
質問 3:
Which action can be performed on the alerts page?
A. Copy and delete configurations
B. Create custom queries and reports
C. Audit the execution of searches, queries, and reports
D. Create and edit alerts
正解:A
質問 4:
A modified policy has been applied to an agent but the agent fails to enforce the policy changes. Upon initial troubleshooting, a red flag icon is displayed in the asset name column in the management console.
What is the meaning of the red flag icon?
A. The agent has duplicate prevention policies with identical names
B. The policy is flagged as high priority and has been escalated
C. The policy is still in the process of being applied
D. The agent system time has yet to be synchronized using NTP
正解:C
質問 5:
Which application is unavailable from the Daemon Options of the UNIX Protection policy?
A. Jboss Application Server
B. Apache Web Server
C. Symantec Storage Foundation HA
D. Sendmail
正解:A
質問 6:
An administrator with a data center consisting of multiple Linux web servers running Apache is asking how Symantec Data Center Security: Server Advanced can be leveraged to detect SQL injection attacks targeted at the servers.
Which advanced policy setting in the UNIX Baseline Policy should be enabled to detect Generic SQL Injection Attacks?
A. SQL Web Attacks
B. System Attack Detection
C. Web Server Detection
D. Apache Server Logs
正解:B
Matsumaru -
完璧です。また買いに来ます。
Pass4Testさん、試験に合格できました。本当に助けになりました。