Questions And Answers PDF
Symantec 250-530 Symantec Network Access Control 12.1 Technical Assesment
Version: DEMO
http://www.TestWarrior.com/250-530-practice-exam.html
FOR 250-530 Candidates: We offer Two Products: 1st - We have Practice Tests Software with Actual Exam Questions 2nd - Questions and Answers in PDF Format. Try a Free DEMO of these Exam Products via below Link:
http://www.TestWarrior.com/250-530-practice-exam.html
TestWarrior.com
1
Questions And Answers PDF
Question 1. What happens when the Symantec Endpoint Protecton Manager is upgraded to include Symantec Network Access Control functonalityy A. Network Access Control has to be enabled manually in the Manager. B. A Symantec Network Access Control Client is deployed to all clients. C. Clients without Host Integrity policies get dropped into Quarantne. D. The Host Integrity policy is enabled in the Policy Library.
Aoswern D Question 2. What are two primary purposes of Symantec Network Access Controly (Select two.) A. install new operatng systems to client workstatons B. update policies on the Symantec Endpoint Protecton Manager C. prevent out-of-compliance systems from impactng producton resources D. check endpoint computers' Host Integrity compliance periodically E. place a non-compliant endpoint into a captve portal
Aoswern CD Question 3. Which two enforcement modes can be confgured on the Symantec 6100 appliancey (Select two.) A. LAN Enforcer B. DHCP Enforcer C. Integrated DHCP Enforcer D. Gateway Enforcer E. Self Enforcement
Aoswern AD Question 4. Which enforcement technology has the ability to deploy the On-Demand clienty A. Integrated Enforcer for Microsof Network Access Protecton B. LAN Enforcer C. Integrated Enforcer for Microsof DHCP Server D. Gateway Enforcer
Aoswern D
TestWarrior.com
2
Questions And Answers PDF
Question 5. Which two databases are supported when Symantec Endpoint Protecton Manager is being confguredy (Select two.) A. Oracle Database 11g B. Microsof SQL Server 2005, SP2 C. Microsof SQL Express, SP1 D. Microsof SQL Server 2008 E. MySQL Database 5.5
Aoswern BD Question 6. A guest is unable to download the On-Demand client. The guest is running Windows 7 64-bit and connectng with the Mozilla Firefox browser. The computer has 512 MB RAM and 50 MB free disk space. What is the likely cause of the problemy A. The guest's system has insufcient disk space. B. The guest's browser is unsupported. C. The guest's operatng system is unsupported. D. The guest's system has insufcient RAM.
Aoswern A Question 7. What is a characteristc of the Symantec Network Access Control Integrated Enforcer for Integrated Enforcersy A. It provides 802.1x enforcement. B. It is only available as a plug-in. C. It is installed as an appliance. D. It requires a DHCP Proxy.
Aoswern B Question 8. Which statement is true about Symantec Network Access Control compliancey A. It ensures that endpoints, such as clients and servers, meet specifc administrator-defned requirements. B. It ensures the management of a secure client endpoint through the creaton and implementaton of group policies. C. It provides services needed by a client to bring itself up to spec in order to gain access to network resources. D. It provides clients with the ability to confgure and deliver content and product updates to other
TestWarrior.com
3
Questions And Answers PDF
clients in the same topological locaton.
Aoswern B Question 9. Which two components run Host Integrity checkingy (Select two.) A. Symantec Endpoint Protecton client B. Symantec Network Access Control LAN Enforcer C. Symantec Network Access Control On-Demand client D. Symantec Network Access Control Gateway Enforcer E. Symantec Critcal System Protecton client
Aoswern AC Question 10. Which enforcement method requires the least amount of efort to implement, can restrict network trafc if desired, and has the least impact on the customer networky A. Integrated Microsof DHCP Enforcement B. Self Enforcement C. Gateway Enforcement D. LAN Enforcement
Aoswern B Question 11. How does the Gateway Enforcer functon on the networky A. Layer 2 routng operaton from external interface to internal interface B. Layer 2 bridging operaton from external interface to internal interface C. Layer 3 bridging operaton from external interface to internal interface D. Layer 3 bridging operaton from internal to external interface
Aoswern B Question 12. Besides a LAN Enforcer, which two components are required for transparent modey (Select two.) A. Symantec Endpoint Protecton Manager B. VPN remote access device C. RADIUS server upstream of LAN Enforcer D. 802.1x capable switch E. ACLs and a frewall enabled in the Enforcer
TestWarrior.com
4
Questions And Answers PDF
Aoswern AD Question 13. When using Symantec Network Access Control Integrated Enforcer, which two additonal components are required for guest access with Host Integrity checkingy (Select two.) A. LAN Enforcer B. Gateway Enforcer C. Symantec Endpoint Protecton Manager D. Microsof IAS Server E. Microsof Actve Directory Domain Controller
Aoswern BC Question 14. Which two functons can Symantec Network Access Control Host Integrity check for and automate to reduce Help Desk calls for IT supporty (Select two.) A. detect and prevent keystroke loggers from running B. ensure required sofware applicatons such as Altris are running C. encrypt wireless communicatons for local administratve users D. start services that have been stopped by users E. query Insight reputaton for a new fle download
Aoswern BD Question 15. Which Symantec Network Access Control technology can prevent a device from connectng to the network and receiving an IP addressy A. LAN Enforcer B. DHCP Enforcer C. Integrated Enforcer D. Self Enforcement
Aoswern A Question 16. Which components do Symantec Network Access Control and Symantec Endpoint Protecton sharey A. identcal user interfaces and the same installer package B. the same locaton awareness policy C. the same Host Integrity policy and Replicaton policy D. the same manager, database schema, and infrastructure mechanics
TestWarrior.com
5
Questions And Answers PDF
Aoswern B Question 17. When using a non-Symantec (third party) ant-virus soluton, which two types of Symantec clients can be usedy (Select two.) A. Symantec On-Demand client B. Symantec Compliance Center client C. Symantec Network Access Control client D. Symantec Dissolvable client for Linux E. Symantec Critcal System Protecton client
Aoswern AC Question 18. A guest with a Macintosh laptop without Symantec Endpoint Protecton installed connects to an organizaton's wireless access point to browse a website. The organizaton uses Symantec Network Access Control with the On-Demand agent feature turned on. Which behavior will the guest's laptop experiencey A. It will be permanently denied all access to the network. B. It will be moved to quarantne VLAN. C. It will be redirected to an HTTP download page. D. It will be given a quarantne IP address.
Aoswern C
TestWarrior.com
6
Questions And Answers PDF
Thank You for Trying Our Product Visit Our Site to Purchase the Full Set of Actual 250-530 Exam Questions With Answers.
http://www.TestWarrior.com/250-530-practice-exam.html We Also Provide Practice Exam Software That Simulates Real Exam Environment And Has Many Self-Assessment Features. Download Free Product Demo From:
Download Free Product Demo from: http://www.TestWarrior.com/250-530-practice-exam.html
Check Out Our Customer Testimonials
TestWarrior.com
7