Exam Code: 250-530
Exam Name: Administration of Symantec Network Access Control 12.1
When using Symantec Network Access Control Integrated Enforcer, which two additional components are required for guest access with Host Integrity checking? (Select two.)
A. LAN Enforcer
B. Gateway Enforcer
C. Symantec Endpoint Protection Manager
D. Microsoft IAS Server
E. Microsoft Active Directory Domain Controller
Which two functions can Symantec Network Access Control Host Integrity check for and automate to reduce Help Desk calls for IT support? (Select two.)
A. detect and prevent keystroke loggers from running
B. ensure required software applications such as Altiris are running
C. encrypt wireless communications for local administrative users
D. start services that have been stopped by users
E. query Insight reputation for a new file download
Which Symantec Network Access Control technology can prevent a device from connecting to the network and receiving an IP address?
A. LAN Enforcer
B. DHCP Enforcer
C. Integrated Enforcer
D. Self Enforcement
Which components do Symantec Network Access Control and Symantec Endpoint Protection share?
A. identical user interfaces and the same installer package
B. the same location awareness policy
C. the same Host Integrity policy and Replication policy
D. the same manager, database schema, and infrastructure mechanics
When using a non-Symantec (third party) anti-virus solution, which two types of Symantec clients can be used? (Select two.)
A. Symantec On-Demand client
B. Symantec Compliance Center client
C. Symantec Network Access Control client
D. Symantec Dissolvable client for Linux
E. Symantec Critical System Protection client
A guest with a Macintosh laptop without Symantec Endpoint Protection installed connects to an organization’s wireless access point to browse a website. The organization uses Symantec Network Access Control with the On-Demand agent feature turned on. Which behavior will the guest’s laptop experience?
A. It will be permanently denied all access to the network.
B. It will be moved to quarantine VLAN.
C. It will be redirected to an HTTP download page.
D. It will be given a quarantine IP address.
What are two capabilities of the Symantec Network Access Control client? (Select two.)
A. provide SONAR protection
B. check for third party security software
C. scan for viruses
D. execute custom scripts
E. provide Network Threat Protection
An employee has an employer-issued laptop with Symantec Endpoint Protection client installed. Symantec Network Access Control is enabled on the laptop. Employees are permitted to connect from a remote network to a corporate network via a VPN connection. The clients connect through a Gateway Enforcer to access the corporate network. What happens first when the employee connects to the corporate network from home though the VPN tunnel?
A. An On-Demand client is downloaded.
B. A LiveUpdate occurs to update Host Integrity templates.
C. The client computer provides compliance information to the Gateway Enforcer.
D. The client computer provides compliance information directly to the Symantec Endpoint Protection Manager.
Which policy type does Symantec Network Access Control client use?
A. Virus and Spyware
B. Host Integrity
C. Intrusion Prevention
D. Application Control
An organization that is deploying Symantec products needs to use network access control, antivirus and spyware, proactive threat protection, and network threat protection software. Which Symantec client(s) should be installed on the organization’s workstations?
A. Symantec Network Access Control client
B. Symantec Network Access Control and Symantec Endpoint Protection clients
C. Symantec Endpoint Protection client
D. Symantec Endpoint Protection and the Symantec On-Demand clients
An administrator has upgraded a Symantec Endpoint Protection Manager to include Symantec Network Access Control. How should the administrator deploy compliance checking to existing Symantec Endpoint Protection clients?
A. Edit the client feature set to include compliance checking.
B. Create compliance checking and add to the ‘Location Specific Setting’.
C. Create compliance checking policies on a per location basis.
D. Edit the ‘Client Install Setting’ to include compliance checking.
Symantec Network Access Control can be implemented standalone or as an integrated module of Symantec Endpoint Protection. What is the only policy that exists in both standalone and integrated implementations
A. Host Integrity
C. Centralized Exceptions
If you want to pass Symantec 250-530 successfully, donot missing to read latest lead2pass Symantec 250-530 dumps.
If you can master all lead2pass questions you will able to pass 100% guaranteed.
|One Time Purchase||✔||✖||✖||✖||✖|
|100% Pass Guarantee||✔||✖||✖||✖||✖|
|100% Money Back||✔||✖||✖||✖||✖|