Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Symantec ASC-029 Exam -

Free ASC-029 Sample Questions:

Q: 1
When defining location switching criteria, which two can be used? (Select two.)
A. MAC address
B. Wins Server address
C. host name
D. NIC description
E. OS type
Answer: B, D

Q: 2
When identifying risks, an administrator should prioritize them according to what? (Select two.)
A. likelihood of occurrence
B. order of occurrence
C. level of inconvenience to the customer
D. impact to the project
E. visibility to senior management
Answer: A, D

Q: 3
With an 802.lx enabled switch, the SNAC client communicates with the switch at which layer of the OSI reference model for EAP authentication?
A. Layer 1 (Physical Layer)
B. Layer 2 (Data Link Layer)
C. Layer 3 (Network Layer)
D. Layer 4 (Transport Layer)
Answer: B

Q: 4
Which port is utilized by default for Symantec Endpoint Protection Manager replication between sites?
A. 8014
B. 8443
C. 9090
D. 2967
Answer: B

Q: 5
Before going to a customer site for solution deployment, what should a consultant check for?
A. places to stay and eat
B. product updates
C. competitive products
D. customer’s competition
Answer: B

Q: 6
What are the correct connect settings for a serial console connection?
A. Data Bits 8, Parity none, Stop Bits 1
B. Data Bits 8, Parity odd, Stop Bits 1
C. Data Bits 8, Parity even, Stop Bits 1
D. Data Bits 8, Parity odd, Stop Bits 2
Answer: A

Q: 7
An organization has three Symantec Endpoint Protection Managers that are replicating to each other. At most, how often should replication occur?
A. once per hour
B. onceevery8 hours
C. once per day
D. once every 4 hours
Answer: C

Q: 8
A company wants to allow remote users access to the corporate network through a VPN connection. The IT director is afraid that if they allow remote access they cannot be sure the remote users have proper security software installed and running on their PCs and may infect the corporate environment. Which form of NAC enforcement would be most effective in keeping this company safe?
A. DHCP enforcement
B. LAN enforcement
C. Gateway enforcement
D. Peer to Peer enforcement
Answer: C

© 2014, All Rights Reserved