Which Symantec Endpoint Protection technology is ineffective on this company's workstations?
A financial company enforces a security policy that prevents banking system workstations from connecting to the Internet. Which Symantec Endpoint Protection technology is ineffective on this company's workstations?A . InsightB . Intrusion PreventionC . Network Threat ProtectionD . Browser Intrusion PreventionView AnswerAnswer: A
Which of the following is most appropriate for this client?
You are advising a school district on disaster recovery plans. In case a disaster affects the main IT centers for the district they will need to be able to work from an alternate location. However, budget is an issue. Which of the following is most appropriate for this client?A ....
What is the best way to achieve the goal?
You deploy an application that performs sentiment analysis on the data stored in Azure Cosmos DB. Recently, you loaded a large amount of data to the database. The data was for a customer named Contoso, Ltd. You discover that queries for the Contoso data are slow to complete, and the...
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
Which of the following is a 16-bit field that identifies the source port number of the application program in the host that is sending the segment?
Which of the following is a 16-bit field that identifies the source port number of the application program in the host that is sending the segment?A . Sequence NumberB . Header LengthC . Acknowledgment NumberD . Source Port AddressView AnswerAnswer: D Explanation: Source Port Address is a 16-bit field that...
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
Where can an administrator obtain the Sylink.xml file?
Where can an administrator obtain the Sylink.xml file?A . C:Program FilesSymantecSymantec Endpoint Protection folder on the clientB . C:Program FilesSymantecSymantec Endpoint ProtectionManagerdatainboxagent folder on the Symantec Endpoint Protection ManagerC . by selecting the client group and exporting the communication settings in the Symantec Endpoint Protection Manager ConsoleD . by selecting...
What criteria does FortiGate use to look for a matching firewall policy to process traffic? (Choose two.)
What criteria does FortiGate use to look for a matching firewall policy to process traffic? (Choose two.)A . Services defined in the firewall policy.B . Incoming and outgoing interfacesC . Highest to lowest priority defined in the firewall policy.D . Lowest to highest policy ID number.View AnswerAnswer: AB
What is required when adding a native user to Splunk? (Choose all that apply.)
What is required when adding a native user to Splunk? (Choose all that apply.)A . PasswordB . UsernameC . Full NameD . Default appView AnswerAnswer: CD Explanation: Reference: https://docs.splunk.com/Documentation/Splunk/7.3.1/Security/Addandeditusers
Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?
Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?A . DNS tunnelingB . DNSCryptC . DNS securityD . DNSSECView AnswerAnswer: A Explanation: Reference: https://learn-umbrella.cisco.com/cloud-security/dns-tunneling