Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Symantec 250-311 Exam -

Free 250-311 Sample Questions:

1. The Symantec Endpoint Protection Manager supports the use of which database solutions? (Choose two.)
A. Microsoft SQL Server 2000
B. MySQL Server 2005
C. Microsoft SQL Server 2005
D. Oracle Database 11g
E. Oracle Database 9i
Answer: AC

2. In the Symantec Endpoint Protection Manager console, where do you modify replication?
A. Admim > Servers > Server Properties > Directory Servers
B. Admin > Servers > Local Site > Replication Partner
C. Policies > Management Server Lists > Replication
D. Admin > Servers > Database > Tasks
Answer: B

3. What are the three configurable actions in TruScan Proactive Threat Scan? (Choose three.)
A. log suspect process only
B. set a public SNMP trap
C. quarantine suspect process
D. terminate the suspect process
E. generate dump of system state
F. suspend the suspect process
Answer: ACD

4. A computer is configured in Mixed Control mode. The administrator creates and applies a firewall policy to the computer that has a rule that allows FTP traffic above the blue line and another rule that blocks LDAP traffic below the blue line. On the computer, local rules are created to allow LDAP traffic and block FTP.
Which traffic flow behavior should be expected on the local computer?
A. Both FTP and LDAP traffic are allowed.
B. Both FTP and LDAP traffic are blocked.
C. FTP is blocked and LDAP is allowed.
D. FTP is allowed and LDAP is blocked.
Answer: A

5. What is one reason for disabling learned applications?
A. Learned applications can often expose usernames and passwords.
B. Learned applications require promiscuous mode.
C. Learned applications are often legitimate programs.
D. Learned applications are illegal in some countries.
Answer: D

6. An administrator believes that client computers are running different software versions of Symantec Endpoint Protection.
Which report type shows which client computers are running different software versions?
A. Application and Device Control Report
B. System Report
C. Compliance Report
D. Computer Status Report
Answer: D

7. Which statement is true about the Database Backup and Restore utility?
A. It only backs up an embedded database.
B. It allows you to define the backup location.
C. It saves database backups to the local computer.
D. It is run from the Symantec Endpoint Protection Manager console.
Answer: C

8. How do administrators back up the embedded database using the tools provided with the Symantec Endpoint Protection Manager?
A. select Start > Programs > Accessories > System Tools > Backup
B. select Start > Programs > Symantec Endpoint Protection Manager > Database Backup and Restore
C. launch Symantec Endpoint Protection Manager Console > Admin page > Database Backup and Restore
D. launch Symantec Endpoint Protection Manager Console > Admin page > launch Backup and Restore Wizard
Answer: B

9. What controls access from one network segment to another?
A. hub
C. sensor
D. firewall
Answer: D

10. Which label is given to a program or algorithm that replicates itself over a computer network and usually performs malicious actions?
A. virus
B. zero-day exploit
C. spam
D. worm
Answer: D

© 2014, All Rights Reserved