Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Symantec 250-503 Exam - Cheat-Test.com

Free 250-503 Sample Questions:

1. Which method increases the security of communications between the SESA Manager and the SESA DataStore across a network?
A. VPN
B. ODBC
C. LDAPS
D. HTTPS
Answer: A

2. Which tool do you use to transfer Symantec Enterprise Security Manager's (Symantec ESM) data to an Oracle database?
A. Policy Tool
B. DBConvert
C. Report Viewer
D. Command Line Interface (CLI) Report
Answer: B

3. You are using the Remote Installation Wizard to install the Symantec Enterprise Security Manager (Symantec ESM) Agent software on computers running UNIX and Windows.
What is one condition that must be met for the remote installations to work?
A. Port 5900 must be open on the firewall.
B. You must create a response file for the Symantec ESM setup program.
C. All of the computers must be on the same subnet as the Symantec ESM Manager performing the installation.
D. The Symantec ESM Manager that performs the remote installation must have the same OS type as the target Symantec ESM Agent.
Answer: D

4. What does the Symantec Vulnerability Assessment authentication value indicate in reports?
A. that the Agent was authorized to run on the host
B. the credibility of the vulnerability information source
C. whether or not a scan has privileged access on the host
D. whether attackers must use credentials to exploit vulnerabilities
Answer: D

5. Which installation type allows you to install the SVA Provider on multiple hosts using the same configuration settings?
A. local
B. silent
C. remote
D. interactive
Answer: B

6. Which Symantec Incident Manager process allows you to manage the phased incident workflow tracking features?
A. action dispositions
B. security intelligence
C. incident identification
D. system security profiles
Answer: A

7. Which information security principle ensures that information is accessible only to those who are authorized?
A. integrity
B. availability
C. confidentiality
D. accountability
Answer: C

8. Which information security principle ensures that information is accessible only to those who are authorized?
A. integrity
B. availability
C. confidentiality
D. accountability
Answer: C

9. Which concept includes the level of threat combined with the level of vulnerability?
A. risk
B. integrity
C. exposure
D. confidentiality
Answer: A

10. What increases as the value of an asset increases?
A. risk
B. threat
C. exposure
D. vulnerability
Answer: A

11. What is a task of event management?
A. event prevention
B. risk consolidation
C. event consolidation
D. vulnerability prevention
Answer: C

12. Which two are incident management tasks? (Choose two.)
A. response
B. risk assessment
C. vulnerability identification
D. policy compliance assessment
Answer: AB

13. What is a set of rules and practices that specifies or regulates how a system or organization protects sensitive and critical system resources?
A. security policy
B. risk assessment policy
C. threat management strategy
D. vulnerability assessment strategy
Answer: A

14. What is a goal of a corporate security policy?
A. control
B. response
C. identification
D. assessment
Answer: A

15. Which audit type is conducted from a central device?
A. internal
B. agentless
C. host-based
D. kernel-based
E. network-based
Answer: E

16. Which component of the Symantec Enterprise Security Architecture (SESA) forwards data generated by security products to the Symantec Security Management System?
A. Agent
B. Provider
C. Manager
D. Collector
E. DataStore
Answer: A

17. Which default protocol is used in communications between a SESA Manager and a SESA Directory?
A. HTTP
B. LDAP
C. HTTPS
D. LDAPS
Answer: D

18. Which default protocol is used in communications between a SESA Manager and a SESA Directory?
A. HTTP
B. LDAP
C. HTTPS
D. LDAPS
Answer: D

19. Which feature allows the Symantec Security Management System to extend analysis to include events from third-party security products?
A. correlation
B. normalization
C. encapsulation
D. alert forwarding
Answer: B

20. What are the two built-in organizational units in Symantec Enterprise Security Architecture (SESA)? (Choose two.)
A. Agents
B. Default
C. Managers
D. Collectors
Answer: BC

21. Which role has the right to view the System View tab?
A. policy administrator
B. default administrator
C. domain administrator
D. organizational administrator
Answer: C

22. LifeLine Supply Company wants to update their security solutions to provide consolidation of security events, containment of security threats and centralization of security policy enforcement.
Which solution can provide all of these features?
A. Symantec Enterprise Security
B. Symantec Vulnerability Assessment
C. Symantec Security Management System
D. Symantec Enterprise Security Manager (Symantec ESM)
Answer: C

23. Which three are true about Symantec Enterprise Security Manager (Symantec ESM) template files? (Choose three.)
A. They are suppressible.
B. They can be created from scratch.
C. They contain definitions of objects and their expected states.
D. They provide computer-specific information about properties of files.
Answer: BCD

24. How does Symantec Enterprise Security Manager (Symantec ESM) check password strength?
A. word lists
B. templates
C. name lists
D. dictionary.txt file
Answer: A

25. Which file does Symantec Enterprise Security Manager (Symantec ESM) initialize during the first run of a security module to identify computer changes?
A. Template
B. Snapshot
C. MasterPolicy
D. Suppressions
Answer: B

26. Which two components make up the Symantec Enterprise Security Manager (Symantec ESM) SANS/FBI Top 20 Best Practice Policy? (Choose two.)
A. checks
B. templates
C. snapshots
D. suppressions
Answer: AB

27. Which module is included in the Symantec Enterprise Security Manager (Symantec ESM) base level Best Practice Policies?
A. File Watch
B. File Access
C. Backup Integrity
D. Password Strength
Answer: D

28. Which statement describes the recommendations made in the ISO 17799?
A. It is technology neutral.
B. It secures Solaris computers.
C. It is designed for the health industry.
D. It reduces risk to bulk electric systems.
Answer: A

29. Which feature of Symantec Enterprise Security Manager (Symantec ESM) allows your own code to be added to Symantec ESM?
A. Policy Editor
B. Module Editor
C. Template Wizard
D. Integrated Command Engine (ICE)
Answer: D

30. Which statement describes the relationship between modules and policies?
A. A policy contains one module.
B. A policy is used to create a module.
C. A policy includes one or more modules.
D. A module includes one or more policies.
Answer: C


© 2014 Cheat-Test.com, All Rights Reserved