Which virtualization integration solution provides the ability to schedule automated scans for reporting on virtual image platform states as well as perform vulnerability scans of critical virtual assets?
Answer : A
Which two features are most useful for efficiently protecting virtual endpoints in a cloud environment when deploying Symantec Endpoint Protection? (Select two.)
Answer : AB
A company's operations staff is concerned about managing public cloud assets. Their primary concern is being notified in the Network Operation Center of key operating system events. Which Symantec agent can be deployed to cloud assets for this purpose?
Answer : D
A company wants to ensure that assets in an IaaS hybrid deployment are protected from malware attacks. Symantec Endpoint Protection has been selected to protect the public assets. The Symantec Endpoint Protection Management servers will remain in the private cloud, but there is concern about network performance for content distribution. Which
Symantec Endpoint Protection resource can be placed in the public cloud to alleviate performance concerns?
Answer : D
Which technology should an IT professional use to reduce the effective attack surface of a cloud-based server?
Answer : D
A company is considering several different cloud deployment models. The company needs the ability to rapidly provision computing capabilities and services (such as server time, network storage, and access) without requiring human interaction. How is this cloud service characteristic categorized?
Answer : D
A customer is considering moving to an on-premise private cloud deployment from a physical infrastructure. Which business goal will be achieved by moving to this type of deployment?
Answer : D
A company has deployed its web infrastructure in a public cloud and its email infrastructure in a private cloud. The company needs to deploy hosted data loss prevention detection servers to monitor web and email traffic. What is the certificate requirement for hosted data loss prevention detection servers?
Answer : C
A file server is placed in a hosted network to allow files to be exchanged between employees located on or off the corporate network. All files placed on the file server must be encrypted to ensure confidentiality, and the PGP Desktop has been installed on all client systems to help facilitate the encryption requirement. Which encryption step must be taken in this situation?
Answer : C
An enterprise deploys PGP in a Virtual Desktop Infrastructure (VDI) to protect data from wrongful exposure as a result of VM theft. Which two cryptographic functions of PGP
Desktop address these concerns? (Select two.)
Answer : C,E
A Symantec O 3 administrator needs to define a policy that allows sales employees to access sales SaaS applications but prevents them from accessing accounting SaaS applications. User identities must be verified with the company LDAP server. Which O 3 component can be used to author this policy?
Answer : A
An enterprise is managing their employee and partner user identities in separate directories. They distribute and manage corporate laptop and mobile devices for all of their employees. For the federated company HR cloud portal, they want to restrict access to PC- based systems only and require two-factor authentication. Which SAML application configuration will an IT professional implement in O 3 to effectively control access to this cloud application?
Answer : D
A company is examining its cloud information security and access control policies. After a cloud security assessment, the company decides to use a cloud service access broker. It will act as an integrated policy decision point and policy enforcement point. Which component of Symantec O 3 can support this requirement?
Answer : C
An organization plans to deploy O 3 to protect both sensitive internal and public cloud web applications. What is the correct policy-authoring workflow the IT professional has to design in order to control access to these applications?
Answer : B
An enterprise customer is planning to host Symantec O 3 Gateway on premise. The company wants user passwords visible only to their identity provider. Which user store will provide this functionality?
Answer : C
Have any questions or issues ? Please dont hesitate to contact us