Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Symantec 250-530 Exam -

Free 250-530 Sample Questions:

Q: 1
Which two databases are supported when Symantec Endpoint Protection Manager is being configured? (Select two.)
A. Oracle Database 11g
B. Microsoft SQL Server 2005, SP2
C. Microsoft SQL Express, SP1
D. Microsoft SQL Server 2008
E. MySQL Database 5.5
Answer: B,D

Q: 2
A guest is unable to download the On-Demand client. The guest is running Windows 7 64-bit and connecting with the Mozilla Firefox browser. The computer has 512 MB RAM and 50 MB free disk space. What is the likely cause of the problem?
A. The guest's system has insufficient disk space.
B. The guest's browser is unsupported.
C. The guest's operating system is unsupported.
D. The guest's system has insufficient RAM.
Answer: A

Q: 3
In an Enforcer command line interface, which filter is used to capture communication traffic between an Enforcer and a Symantec Endpoint Protection Manager?
A. auth
B. client
C. query
D. spm
Answer: D

Q: 4
Which log contains IP address, connection attempt, port information, and the direction of the connection?
A. Enforcer Client log
B. Enforcer Kernel log
C. Enforcer Traffic log
D. Enforcer Packet log
Answer: C

Q: 5
An organization has deployed Symantec Network Access Control with LAN Enforcer. Historically, all clients were Windows based endpoints. Now, Linux endpoints that authenticate with Microsoft Active Directory will need to be authenticated through the LAN Enforcer. Which entry needs to be added to the Switch Profile Action table to open the port for Linux endpoints once they have been authenticated through Active Directory user credentials?
A. Host Authentication: Pass, User Authentication: Pass, Policy Check: Pass, Action: Open Port
B. Host Authentication: Fail, User Authentication: Fail, Policy Check: Ignore, Action: Close Port
C. Host Authentication: Unavailable, User Authentication:Pass, Policy Check: Unavailable, Action: Open Port
D. Host Authentication: Pass, User Authentication: Unavailable, Policy Check: Unavailable, Action: Close Port
Answer: C

Q: 6
How can an administrator provide computers on a quarantine VLAN with access to remediation materials without using static routes?
A. Assign a virtual IP address to the NIC on the remediation server and add it to the quarantine VLAN.
B. Create a static route from the quarantine VLAN to the Symantec Endpoint Protection Manager in the Enforcer command line interface.
C. Multi-home the remediation server and connect one NIC to a port assigned to the quarantine VLAN.
D. Put a wireless access point on the quarantine VLAN to provide wireless access to quarantined clients.
Answer: C

Q: 7
The 802.1x protocol has three major components: Supplicant, Authenticator and Authentication Server. Which elements serve each of these components when Symantec Network Access Control is being configured to use LAN Enforcement?
A. Supplicant: Symantec Endpoint Protection Client,
Authenticator: Symantec LAN Enforcer,
Authentication Server: Microsoft Active Directory Domain Controller
B. Supplicant: Microsoft Supplicant,
Authenticator: 802.1x Enabled Switch,
Authentication Server: Symantec LAN Enforcer
C. Supplicant: Network Access Control Client,
Authenticator: Symantec Endpoint Protection Policy Manager,
Authentication Server: Symantec LAN Enforcer
D. Supplicant: Microsoft Supplicant,
Authenticator: Microsoft Active Directory Domain Controller,
Authentication Server: Symantec Endpoint Protection Manager
Answer: B

Q: 8
A Host Integrity policy has a complex custom conditional check that has three IF THEN statements, two of which have ELSE statements. How many ENDIF statements are required?
A. 0
B. 1
C. 3
D. 5
Answer: C

Q: 9
An organization with a Gateway Enforcer behind a VPN concentrator that is performing NAT, determines that clients are being blocked. What is the most likely cause of the problem?
A. The client is missing from the MAC Address Bypass list.
B. The IP address of the internal interface of the VPN connector needs to be added to the Trusted External IP Address list.
C. The Enforcer is placed in the wrong physical location on the network.
D. Static routes need to be added to the Symantec Endpoint Protection Manager to pass the client traffic.
Answer: B

Q: 10
When a Gateway Enforcer is being deployed, which port needs to be kept open between the clients and the Enforcer?
A. TCP 1812
B. TCP 39999
C. UDP 39999
D. UDP 1812
Answer: C

© 2014, All Rights Reserved