123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Education >> View Article

250-505 Latest Certification Tests

Profile Picture
By Author: mcleod.k
Total Articles: 155
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Question: 1

What determines how a Symantec Data Center Security: Server Advanced agent performs protection?

A. zero-day protection standards
B. business critical mission controls
C. prevention and detection policies
D. industry and governmental regulations

Answer: C

Question: 2

How does Symantec Data Center Security: Server Advanced limit the potential for exploitation of enterprise resources?

A. by ensuring all patches are implemented
B. by detecting and repairing known malware
C. by implementing least privilege access controls
D. by recognizing aggressive software and user behavior

Answer: C

Question: 3

Which feature can be configured using a detection policy?

A. Closing network back doors by defining ports to be monitored
B. De-escalation of Administrator Privileges
C. Real-Time File Integrity Monitoring
D. Restricting Access to Externally Connected ...
... Devices

Answer: C

Question: 4

Which two statements accurately describe an advantage of using Symantec Data Center Security: Server Advanced prevention policies over traditional malware protection products? (Select two.)

A. Symantec Data Center Security: Server Advanced prevention policies are proactive in protecting against Malware.
B. Symantec Data Center Security: Server Advanced prevention policies require infrequent signature updates.
C. Symantec Data Center Security: Server Advanced prevention policies can be applied to a machine without installing agent software on the host machine.
D. Symantec Data Center Security: Server Advanced prevention policies protect a system by controlling the behavior of all processes running on that system.
E. Symantec Data Center Security: Server Advanced prevention policies are platform agnostic.

Answer: A, D

Question: 5

Which action applies to prevention policies rather than detection policies?

A. they detect changes to files using Real-Time File Integrity Monitoring
B. they audit changes to registry keys, files and folders
C. they monitor for local events that trigger actions when matched
D. they sandbox processes proactively when executed

Answer: D

Question: 6

Which feature can be configured using a detection policy?

A. Closing network back doors by defining ports to be monitored
B. De-escalation of Administrator Privileges
C. Real-Time File Integrity Monitoring
D. Restricting Access to Externally Connected Devices

Answer: C

Question: 7

Which action can the administrator perform using the management console?

A. Two factor authentication
B. User generated reports
C. Administrator password complexity
D. Network bandwidth throttling

Answer: B

Question: 8

Which two statements accurately describe Symantec Data Center Security: Server Advanced simple failover? (Select two.)

A. The management console uses the first server in the ordered list of management servers when it starts up
B. Enables deployment of a set of front-end Tomcat servers without reconfiguring the IT infrastructure
C. Can provide static load balancing via manual assignment of agents to each Tomcat server
D. The Symantec Data Center Security: Server Advanced Security Virtual Appliance supports simple failover
E. An ordered list of management servers for simple failover is maintained by the SQL Data Store

Answer: B, C

Question: 9

Which component is excluded from the Symantec Data Center Security: Server Advanced architecture?

A. Security Virtual Appliance
B. Management Server
C. IIS Web Server
D. Management Console

Answer: C

Question: 10

Which key component stores the policies, agent information, and real-time actionable events?

A. Management Server
B. Database Server
C. Management Console
D. Security Virtual Appliance

Answer: B

Total Views: 584Word Count: 834See All articles From Author

Add Comment

Education Articles

1. How One-to-one Learning With Home Tutors For Igcse Improves Confidence
Author: rukhsar

2. The Contribution Of Data Science To Mangalore’s Expanding Technology And Analytics Ecosystem
Author: Abijith

3. Apigee Training | Api Management & Security By Gologica
Author: Gologica

4. Ms Dynamics Crm Online Training | Dynamics 365 Crm Course
Author: krishna

5. Data Science Online Training | Data Science Course 2026
Author: Vamsi Ulavapati

6. Servicenow Itom Training | Servicenow Cmdb Online Training
Author: Hari

7. Data Analyst Careers Built Around Business Insights
Author: Datamites

8. Why Parents Prefer The Best English Medium Schools In Khordha
Author: Asha International School

9. Level 4 Verifier Award (iqa) Course And Level 4 Lead Internal Quality Assurer
Author: Mark

10. Level 3 Award In Education & Training (aet) Course
Author: Mark

11. Level 3 Award In Education & Training (aet) Course And Level 4 Certificate In Education & Training (cet) Course – A Complete Guide
Author: Mark

12. Best Salesforce Devops Training In Hyderabad | Visualpath
Author: Vamsi Ulavapati

13. Top Igcse Schools In Hyderabad
Author: vijji

14. Start Nda Preparation After 10th: 1 Year Foundation Program With Schooling In Pune
Author: Nation Defence Academy

15. Top Azure Data Engineer Online Training | Azure Data Course
Author: kalyan

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: