2014年4月12日星期六

Latest Symantec 250-530 of exam practice questions and answers free download

Do you want to pass the Symantec 250-530 exam better and faster? Then please select the IT-Tests.com. It can help you achieve your dreams. IT-Tests.com is a website that provide accurate exam materials for people who want to participate in the IT certification. IT-Tests.com can help a lot of IT professionals to enhance their career blueprint. Our strength will make you incredible. You can try a part of the questions and answers about Symantec 250-530 exam to test our reliability.

IT-Tests.com provides a clear and superior solutions for each Symantec 250-530 exam candidates. We provide you with the Symantec 250-530 exam questions and answers. Our team of IT experts is the most experienced and qualified. Our test questions and the answer is almost like the real exam. This is really amazing. More importantly, the examination pass rate of IT-Tests.com is highest in the worldwide.

In life we mustn't always ask others to give me something, but should think what I can do for others. At work if you can create a lot of value for the boss, the boss of course care about your job, including your salary. The same reason, if we are always a ordinary IT staff, yhen you will be eliminated sooner or later . We should pass the IT exams, and go to the top step by step. IT-Tests.com's Symantec 250-530 exam materials can help you to find shortcut to success. There are a lot of IT people who have started to act. Success is in the IT-Tests.com Symantec 250-530 exam training materials. Of course you can not miss it.

The exam questions and answers of general Symantec certification exams are produced by the IT specialist professional experience. IT-Tests.com just have these IT experts to provide you with practice questions and answers of the exam to help you pass the exam successfully. Our IT-Tests's practice questions and answers have 100% accuracy. Purchasing products of IT-Tests.com you can easily obtain Symantec certification and so that you will have a very great improvement in IT area.

Exam Code: 250-530
Exam Name: Symantec (Administration of Symantec Network Access Control 12.1 )
Free One year updates to match real exam scenarios, 100% pass and refund Warranty.
Total Q&A: 110 Questions and Answers
Last Update: 2014-04-11

On IT-Tests.com website you can free download part of the exam questions and answers about Symantec certification 250-530 exam to quiz our reliability. IT-Tests's products can 100% put you onto a success away, then the pinnacle of IT is a step closer to you.

God is fair, and everyone is not perfect. As we all know, the competition in the IT industry is fierce. So everyone wants to get the IT certification to enhance their value. I think so, too. But it is too difficult for me. Fortunately, I found IT-Tests.com's Symantec 250-530 exam training materials on the Internet. With it, I would not need to worry about my exam. IT-Tests.com's Symantec 250-530 exam training materials are really good. It is wide coverage, and targeted. If you are also one of the members in the IT industry, quickly add the IT-Tests.com's Symantec 250-530 exam training materials to your shoppingcart please. Do not hesitate, do not hovering. IT-Tests.com's Symantec 250-530 exam training materials are the best companion with your success.

250-530 (Administration of Symantec Network Access Control 12.1 ) Free Demo Download: http://www.it-tests.com/250-530.html

NO.1 What are the correct connection settings for a serial connection?
A. Data Bits: 8; Parity: none; Stop Bits: 1
B. Data Bits: 8; Parity: odd; Stop Bits: 1
C. Data Bits: 8; Parity: even; Stop Bits: 1
D. Data Bits: 8; Parity: odd; Stop Bits: 2
Answer: D

Symantec   250-530   250-530

NO.2 What is the default time interval for Host Integrity checks?
A. Continuous
B. 2 minutes
C. 5 minutes
D. 30 minutes
Answer: B

Symantec   250-530   250-530 practice test   250-530 braindump   250-530 exam simulations

NO.3 Refer to the exhibit.
An administrator needs a custom requirement to run a script if a file does not exist. Which modification to
the logic shown in the exhibit performs this functionality?
A. Add a nested AND/OR statement to run a script after the END IF.
B. Add a nested result to run a script after the Pass.
C. Use an OR modifier to run a script after the IF.
D. Use an ELSE statement to run a script after the THEN.
Answer: D

Symantec   250-530 demo   250-530 study guide   250-530 test

NO.4 Which two are explanations of why auto-location switching may be useful for Host Integrity? (Select
two.)
A. It can define different Remediation sources, based on location.
B. It can enable different Antivirus features, based on location.
C. It can choose different Firewall rule sets, based on location.
D. It can select different Host Integrity checks, based on location
E. It can enable different LiveUpdate features, based on location.
Answer: A,D

Symantec pdf   250-530   250-530

NO.5 On a LAN Enforcer, which command shows the switch action table decisions in real time?
A. show spm
B. show auth live
C. show kernel live
D. show action live
Answer: C

Symantec certification   250-530 original questions   250-530   250-530

NO.6 Which check can be performed using custom requirements to verify whether "a product is installed" on
a client machine?
A. check the registry keys to see if the product is installed
B. check the service snap-in to see if the product is installed
C. check the policy document to see if the product is installed
D. check the IT documentation to see if the product is installed
Answer: D

Symantec   250-530   250-530   250-530 certification   250-530

NO.7 At the Enforcer (debug)# prompt, which command enables the most detailed level of debugging?
A. level engineer
B. level verbose
C. level fine
D. level error
Answer: A

Symantec demo   250-530   250-530   250-530 pdf   250-530 demo

NO.8 An organization's security policy requires Host Integrity checks to run only when the client is
connecting through a VPN concentrator whose internal interface is attached to a Gateway Enforcer.
Which setting should be configured to only check Host Integrity on these external clients, but not check
clients on the local network?
A. Apply the Host Integrity agent to the external computers only.
B. Add the IP addresses of the internal clients that need not be checked to the "Trusted Internal IP
Address Range".
C. Select "Only do Host-Integrity checking through the Gateway or DHCP Enforcer".
D. Block port UDP 39999 on the client firewalls of the internal clients, so that they cannot be challenged
by the Enforcer.
Answer: C

Symantec braindump   250-530 certification   250-530

NO.9 Which protocol is used to transfer packet captures from an Enforcer?
A. FTP
B. HTTP
C. TFTP
D. SFTP
Answer: C

Symantec   250-530 test   250-530   250-530 answers real questions

NO.10 How can access be permitted to remediation services when a client fails the Host Integrity check using
a Gateway Enforcer?
A. Add the client's IP address to the Trusted External IP Address List.
B. Add the client's MAC Address to the Mac Address Bypass table.
C. Add the IP addresses of the hosts to the Trusted Internal IP Address List.
D. Add the client to the Allowed Client table on the Enforcer.
Answer: C

Symantec   250-530 pdf   250-530 dumps   250-530 certification training

NO.11 A Host Integrity policy has a complex custom conditional check that has three IF THEN statements, two
of which have ELSE statements. How many ENDIF statements are required?
A. 0
B. 1
C. 3
D. 5
Answer: C

Symantec pdf   250-530 certification training   250-530   250-530 certification training   250-530 answers real questions

NO.12 The 802.1x protocol has three major components: Supplicant, Authenticator and Authentication Server.
Which elements serve each of these components when Symantec Network Access Control is being
configured to use LAN Enforcement?
A. Supplicant: Symantec Endpoint Protection Client,
Authenticator: Symantec LAN Enforcer,
Authentication Server: Microsoft Active Directory Domain Controller
B. Supplicant: Microsoft Supplicant,
Authenticator: 802.1x Enabled Switch,
Authentication Server: Symantec LAN Enforcer
C. Supplicant: Network Access Control Client,
Authenticator: Symantec Endpoint Protection Policy Manager,
Authentication Server: Symantec LAN Enforcer
D. Supplicant: Microsoft Supplicant,
Authenticator: Microsoft Active Directory Domain Controller,
Authentication Server: Symantec Endpoint Protection Manager
Answer: B

Symantec braindump   250-530 exam simulations   250-530   250-530   250-530 dumps

NO.13 Refer to the exhibit.
An administrator has created a custom requirement to remediate an operating system patch. The custom
requirement appears to be working intermittently with clients that fail the patch installation, passing the
requirement anyway. What is the likely cause of the issue?
A. The logic is missing a Fail result.
B. The logic is missing an ELSE statement.
C. The logic has an extra Pass result.
D. The logic needs an additional IF/THEN item.
Answer: C

Symantec exam dumps   250-530   250-530 exam prep   250-530 pdf   250-530 certification   250-530

NO.14 How does Symantec Network Access Control handle location switching compared to Symantec
Endpoint Protection?
A. It uses a reverse logic structure.
B. It excludes locations.
C. It uses locations instead of groups.
D. It handles locations in the same way.
Answer: D

Symantec certification   250-530   250-530   250-530   250-530 answers real questions

NO.15 An organization has deployed Symantec Network Access Control with LAN Enforcer. Historically, all
clients were Windows based endpoints. Now, Linux endpoints that authenticate with Microsoft Active
Directory will need to be authenticated through the LAN Enforcer. Which entry needs to be added to the
Switch Profile Action table to open the port for Linux endpoints once they have been authenticated
through Active Directory user credentials?
A. Host Authentication: Pass, User Authentication: Pass, Policy Check: Pass, Action: Open Port
B. Host Authentication: Fail, User Authentication: Fail, Policy Check: Ignore, Action: Close Port
C. Host Authentication: Unavailable, User Authentication:Pass, Policy Check: Unavailable, Action: Open
Port
D. Host Authentication: Pass, User Authentication: Unavailable, Policy Check: Unavailable, Action: Close
Port
Answer: C

Symantec answers real questions   250-530   250-530   250-530 exam

NO.16 Which log contains IP address, connection attempt, port information, and the direction of the
connection?
A. Enforcer Client log
B. Enforcer Kernel log
C. Enforcer Traffic log
D. Enforcer Packet log
Answer: C

Symantec certification   250-530   250-530   250-530 braindump   250-530   250-530

NO.17 A Helpdesk technician is examining the logs for a particular client when he notices something odd. A
Host Integrity event is listed for a client as failing a requirement, but that client machine is still able to
access the network even after having the check rerun several times. Why would the client's Host Integrity
status still pass?
A. The requirement logic is malfunctioning and the Helpdesk technician should notify the administrator to
contact the vendor.
B. It is likely to be a problem with the recording of the status. The log search must be rerun to update the
status.
C. The administrator has configured that requirement to allow the Host Integrity policy to pass even if it
fails.
D. The administrator has configured the OS to ignore Host Integrity even when it fails.
Answer: D

Symantec   250-530   250-530 braindump   250-530 original questions   250-530   250-530 exam prep

NO.18 When a Gateway Enforcer is being deployed, which port needs to be kept open between the clients
and the Enforcer?
A. TCP 1812
B. TCP 39999
C. UDP 39999
D. UDP 1812
Answer: C

Symantec   250-530   250-530 questions

NO.19 Which default port must a firewall administrator open to enable communication between an Enforcer
and the Symantec Endpoint Protection Manager?
A. 1433
B. 1812
C. 8443
D. 8080
Answer: B

Symantec   250-530 exam   250-530 test questions   250-530   250-530

NO.20 What should an administrator do to obtain additional information about Host Integrity checking for a
newly implemented Host Integrity policy?
A. Create a customized computer status report on the management server.
B. Enable the reporting of additional log events on the client systems.
C. Set verbose logging on the Host Integrity policy.
D. Enable debug logging on the enforcer.
Answer: C

Symantec   250-530   250-530 original questions   250-530 test   250-530   250-530 study guide

NO.21 Refer to the exhibit.
A Symantec Network Access Control administrator is trying to implement two Gateway Enforcers in
failover mode. The administrator has implemented the two Enforcers in the network as shown in the
exhibit. After starting both Gateway Enforcers, the administrator finds that both Enforcers are in active
mode. What is the likely cause of the problem?
A. The failover configuration is missing.
B. The router is blocking multicast traffic.
C. The administrator failed to configure the Enforcers in Symantec Endpoint Protection Manager.
D. The Gateway Enforcers are configured in the same Gateway Enforcer group.
Answer: B

Symantec questions   250-530   250-530   250-530   250-530 study guide   250-530

NO.22 What will happen if a user switches to a location with a different Host Integrity policy while a Host
Integrity check is in progress?
A. The Host Integrity check will fail and the client will be denied network access.
B. The client will stop the check and the user may get a timeout if attempting to reach remediation
resources.
C. The client is permitted guest access to the quarantine network until the next scheduled Host Integrity
check.
D. The Host Integrity check always completes prior to moving between locations.
Answer: B

Symantec study guide   250-530   250-530 test

NO.23 Which packets are periodically sent from an Enforcer to find other Enforcers on the network?
A. Failover
B. Discover
C. ARP
D. OSPF
Answer: A

Symantec exam prep   250-530 exam prep   250-530 study guide   250-530   250-530 certification

NO.24 A guest is unable to download the On-Demand client. The guest is running Windows 7 64-bit and
connecting with the Mozilla Firefox browser. The computer has 512 MB RAM and 50 MB free disk space.
What is the likely cause of the problem?
A. The guest's system has insufficient disk space.
B. The guest's browser is unsupported.
C. The guest's operating system is unsupported.
D. The guest's system has insufficient RAM.
Answer: A

Symantec braindump   250-530 certification   250-530   250-530   250-530

NO.25 In an Enforcer command line interface, which filter is used to capture communication traffic between an
Enforcer and a Symantec Endpoint Protection Manager?
A. auth
B. client
C. query
D. spm
Answer: D

Symantec exam simulations   250-530   250-530 certification training   250-530   250-530

NO.26 Which two databases are supported when Symantec Endpoint Protection Manager is being configured?
(Select two.)
A. Oracle Database 11g
B. Microsoft SQL Server 2005, SP2
C. Microsoft SQL Express, SP1
D. Microsoft SQL Server 2008
E. MySQL Database 5.5
Answer: B,D

Symantec   250-530   250-530   250-530

NO.27 An organization with a Gateway Enforcer behind a VPN concentrator that is performing NAT,
determines that clients are being blocked. What is the most likely cause of the problem?
A. The client is missing from the MAC Address Bypass list.
B. The IP address of the internal interface of the VPN connector needs to be added to the Trusted
External IP Address list.
C. The Enforcer is placed in the wrong physical location on the network.
D. Static routes need to be added to the Symantec Endpoint Protection Manager to pass the client traffic.
Answer: B

Symantec   250-530   250-530   250-530   250-530 test answers

NO.28 When would the Enforcer need to be reset to factory defaults?
A. to change the type of Enforcer
B. to upgrade the Enforcer
C. to purge any errors on the Enforcer
D. to purge all logs from the Enforcer
Answer: A

Symantec   250-530 test   250-530   250-530 practice test   250-530

NO.29 Which statement is true about Symantec Network Access Control compliance?
A. It ensures that endpoints, such as clients and servers, meet specific administrator-defined
requirements.
B. It ensures the management of a secure client endpoint through the creation and implementation of
group policies.
C. It provides services needed by a client to bring itself up to spec in order to gain access to network
resources.
D. It provides clients with the ability to configure and deliver content and product updates to other clients
in the same topological location.
Answer: B

Symantec   250-530 original questions   250-530 test answers

NO.30 How can an administrator provide computers on a quarantine VLAN with access to remediation
materials without using static routes?
A. Assign a virtual IP address to the NIC on the remediation server and add it to the quarantine VLAN.
B. Create a static route from the quarantine VLAN to the Symantec Endpoint Protection Manager in the
Enforcer command line interface.
C. Multi-home the remediation server and connect one NIC to a port assigned to the quarantine VLAN.
D. Put a wireless access point on the quarantine VLAN to provide wireless access to quarantined clients.
Answer: C

Symantec demo   250-530   250-530 test questions

IT-Tests.com offer the latest 70-487 Questions & Answers and high-quality EX0-118 PDF Practice Test. Our HP3-C29 VCE testing engine and CAT-440 study guide can help you pass the real exam. High-quality 70-462 Real Exam Questions can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.

Article Link: http://www.it-tests.com/250-530.html

没有评论:

发表评论