2013년 8월 1일 목요일

Symantec 자격증 ST0-174 시험덤프

우리ITExamDump에서는 각종IT시험에 관심있는분들을 위하여, 여러 가지 인증시험자료를 제공하는 사이트입니다. 우리ITExamDump는 많은 분들이 IT인증시험을 응시하여 성공할수록 도와주는 사이트입니다. 우리의 파워는 아주 대단하답니다. 여러분은 우리ITExamDump 사이트에서 제공하는Symantec ST0-174관련자료의 일부분문제와답등 샘플을 무료로 다운받아 체험해봄으로 우리에 믿음이 생기게 될 것입니다.


Symantec ST0-174인증시험을 어떻게 준비하면 될가 아직도 고민하고 계시죠? 학원에 등록하자니 시간도 없고 돈도 많이 들고 쉽게 엄두가 나지 않는거죠? ITExamDump제품을 구매하신다면 그런 부담을 이제 끝입니다. ITExamDump덤프는 더욱 가까지 여러분들께 다가가기 위하여 그 어느 덤프판매 사이트보다 더욱 저렴한 가격으로 여러분들을 맞이하고 있습니다. Symantec ST0-174덤프는ITExamDump제품이 최고랍니다.


시험 번호/코드: ST0-174

시험 이름: Symantec (Symantec Data Loss Prevention 11.5 Technical Assessment )

ITExamDump에서는Symantec 인증ST0-174시험대비덤프를 발췌하여 제공해드립니다. Symantec 인증ST0-174시험대비덤프에는 시험문제의 모든 예상문제와 시험유형이 포함되어있어 시험준비자료로서 가장 좋은 선택입니다. ITExamDump에서 제공해드리는 전면적인Symantec 인증ST0-174시험대비덤프로Symantec 인증ST0-174시험준비공부를 해보세요. 통과율이 100%입니다.


ITExamDump의 Symantec인증 ST0-174시험덤프자료는 여러분의 시간,돈 ,정력을 아껴드립니다. 몇개월을 거쳐 시험준비공부를 해야만 패스가능한 시험을ITExamDump의 Symantec인증 ST0-174덤프는 며칠간에도 같은 시험패스 결과를 안겨드릴수 있습니다. Symantec인증 ST0-174시험을 통과하여 자격증을 취득하려면ITExamDump의 Symantec인증 ST0-174덤프로 시험준비공부를 하세요.


ST0-174 덤프무료샘플다운로드하기: http://www.itexamdump.com/ST0-174.html


NO.1 What are two possible ways to provide incident match text information? (Select two.)
A. CSV export
B. Email notification
C. Reporting API
D. Syslog notification
E. XML export
Answer: C,E

Symantec   ST0-174   ST0-174기출문제

NO.2 How can an administrator validate that once a policy is updated and saved it has been enabled on a
specific detection server?
A. check the status of the policy on the policy list page
B. check to see whether the policy was loaded under System > Servers > Alerts
C. check the policy and validate the date and time it was last updated
D. check to see whether the policy was loaded under System > Servers > Events
Answer: D

Symantec dumps   ST0-174   ST0-174최신덤프

NO.3 Which is the correct traffic flow for the Symantec Data Loss Prevention for Tablets solution?
A. iPad > VPN > Tablet Server > Exchange Server > final destination
B. iPad > VPN > Web proxy > Tablet Server > final destination
C. iPad > VPN > Web proxy > Tablet Server > Enforce Server > final destination
D. iPad > VPN > Tablet Server > Web proxy > final destination
Answer: B

Symantec인증   ST0-174   ST0-174 pdf   ST0-174인증   ST0-174 dumps

NO.4 Which product must run on a physical server?
A. Endpoint Prevent
B. Network Monitor
C. Enforce D. Network Prevent
Answer: B

Symantec덤프   ST0-174   ST0-174   ST0-174

NO.5 Which two should be used to collect log information from Enforce servers? (Select two.)
A. enable the VontuSNMP service and set the community strings accordingly
B. use the Log Collection and Configuration tool
C. navigate manually to the log directory of the Enforce server installation
D. .access the Enforce Log Viewer page athttps://<VONTU_SRV>/logs?view=true
E. use dbgmonitor from sysinternals to connect to the debug output of the service
Answer: B,C

Symantec인증   ST0-174   ST0-174기출문제

NO.6 Which option describes the three-tier installation type for Symantec Data Loss Prevention?
A. Install the database, the Enforce Server, and a detection server all on the same computer.
B. Install the Oracle database and the Enforce Server on the same computer, then install detection
servers on separate computers.
C. Install the Oracle Client (SQL*Plus and Database Utilities) on three detection servers.
D. Install the Oracle database, the Enforce Server, and a detection server on separate computers.
Answer: C

Symantec dump   ST0-174   ST0-174   ST0-174최신덤프

NO.7 A scanner fails to return results upon completion of the scan process. Which file should be removed to
eliminate previous scan issues?
A. scanner_typeScanner.cfg
B. Clean.exe
C. ScannerControllerLogging.properties
D. logs
Answer: A

Symantec   ST0-174덤프   ST0-174   ST0-174   ST0-174

NO.8 An administrator has completed the example document training process, but is having difficulty deciding
whether or not to accept a VML profile. Where can the administrator find information regarding the quality
of each training set at a granular, per-fold level?
A. machinelearning_training_process.log file
B. machinelearning_native_filereader.log file
C. machinelearning_training.log file
D. machinelearning_native_manager.log file
Answer: C

Symantec시험문제   ST0-174인증   ST0-174최신덤프   ST0-174자료   ST0-174최신덤프

NO.9 What is one benefit of using FlexResponse for Network Discover?
A. Response rules trigger varying actions depending on which DLP Agent created the incident.
B. An email can be encrypted as it is being transmitted.
C. Displayed incident data can be redacted from the Data Loss Prevention interface automatically.
D. Customizable incident remediation actions can be manually executed.
Answer: D

Symantec   ST0-174자격증   ST0-174   ST0-174자격증

NO.10 What is the function of the Remote Indexer?
A. to create Index Document Matching (IDM) profiles and Exact Data Matching (EDM) profiles on a
remote server
B. to create Exact Data Matching (EDM) profiles on a remote server
C. to create policy templates on a remote server
D. to create Index Document Matching (IDM) profiles on a remote server
Answer: B

Symantec   ST0-174기출문제   ST0-174

NO.11 A user attempts to run Lookup Attributes manually on an incident. On the Incident List page under
Incident Actions, the option for Lookup Attributes is missing. Which section in the Plugins.properties file is
misconfigured?
A. Plugin Execution Chain is undefined.
B. Attribute Lookup parameters is set to "message".
C. Automatic plugin reload is set to false.
D. Automatic Lookup is set to false.
Answer: A

Symantec   ST0-174 dumps   ST0-174

NO.12 What are two benefits of the Symantec Data Loss Prevention 11.5 security architecture? (Select two.)
A. Communication is initiated by the detection servers inside the firewall.
B. SSL communication is used for user access to the Enforce Platform.
C. Endpoint Agent to Endpoint Server communication uses the Triple Data Encryption Standard (Triple
DES).
D. Confidential information captured by system components is stored using Advanced Encryption
Standards (AES) symmetric keys.
E. All indexed data uploaded into the Enforce Platform is protected with a two-way hash.
Answer: B,D

Symantec자격증   ST0-174   ST0-174   ST0-174   ST0-174최신덤프

NO.13 Which profile contains information to enable the VPN on Demand functionality for the Data Loss
Prevention for Tablets solution.?
A. DLP Agent profile
B. SCEP profile
C. iOS profile
D. VPN client profile
Answer: C

Symantec dumps   ST0-174 dumps   ST0-174 pdf   ST0-174   ST0-174자료

NO.14 In which two ways can the default listener port for a detection server be modified? (Select two.)
A. through the Enforce user interface under System > Overview
B. by editing the Communication.properties file on a detection server
C. through the Enforce user interface under Manage > Policies
D. by editing the MonitorController.properties file on a detection server
E. by editing the jaas.config file on a detection server
Answer: A,B

Symantec pdf   ST0-174 dumps   ST0-174

NO.15 Which product can replace a confidential document residing on a share with a marker file explaining
why the document was removed?
A. Network Discover
B. Network Protect
C. Endpoint Prevent
D. Endpoint Discover
Answer: B

Symantec   ST0-174   ST0-174

NO.16 An approved Endpoint device has been configured and added as an exception to a policy that blocks
the transfer of sensitive data. Data transfers to these approved Endpoint devices are still being blocked.
What should the Data Loss Prevention administrator do to resolve this?
A. disable and enable the policy involved for the changes to take effect
B. edit the exception rule to ensure Match On is set to "Attachments"
C. verify that the proper device ID or class has been entered
D. assign the Endpoint device configuration to all the Endpoint servers
Answer: C

Symantec인증   ST0-174   ST0-174기출문제   ST0-174   ST0-174   ST0-174시험문제

NO.17 Which detection server requires two physical network interface cards?
A. Network Protect
B. Network Discover
C. Endpoint Discover
D. Network Monitor
Answer: B

Symantec덤프   ST0-174   ST0-174시험문제   ST0-174   ST0-174

NO.18 What is a possible solution when a Network Discover server is unable to scan a remote file server?
A. mount the IPC$ share on the file server
B. verify that the target file server is a Windows 2000 server
C. use the fully qualified name (FQDN) of the server
D. verify that the file server has .NET services running
Answer: C

Symantec   ST0-174   ST0-174인증

NO.19 Which two components are required for the Symantec Data Loss Prevention for Tablets solution in
addition to the Tablet Prevent and Enforce servers? (Select two.)
A. DLP Agent
B. Virtual Private Network Gateway
C. Web Proxy
D. 2010 Exchange Server
E. Mobile Device Management
Answer: B,C

Symantec덤프   ST0-174   ST0-174   ST0-174 dumps

NO.20 A Network Monitor server has been installed and the networking components configured accordingly.
The server is receiving traffic, but fails to detect incidents. Running Wireshark indicates that the desired
traffic is reaching the detection server. What is the most likely cause for this behavior?
A. The mirrored port is sending corrupted packets.
B. The wrong interface is selected in the configuration.
C. The configuration is set to process GET requests.
D. The communication to the database server is interrupted.
Answer: D

Symantec인증   ST0-174   ST0-174자료   ST0-174   ST0-174 dump

Symantec인증 ST0-174시험을 한방에 편하게 통과하여 자격증을 취득하려면 시험전 공부가이드가 필수입니다. ITExamDump에서 연구제작한 Symantec인증 ST0-174덤프는Symantec인증 ST0-174시험을 패스하는데 가장 좋은 시험준비 공부자료입니다. ITExamDump덤프공부자료는 엘리트한 IT전문자들이 자신의 노하우와 경험으로 최선을 다해 연구제작한 결과물입니다.IT인증자격증을 취득하려는 분들의 곁은ITExamDump가 지켜드립니다.


댓글 없음:

댓글 쓰기