- 1、本文档共10页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Symantec Symantec Network Access Control 121 Technical Assesment ST0-135题库.pdf
Symantec ST0-135
Symantec Network Access Control 12.1 Technical
Assesment
Version: 4.1
买题库 QQ:860424807
Symantec ST0-135 Exam
Topic 1, Volume A
QUESTION NO: 1
Which two databases are supported when Symantec Endpoint Protection Manager is being
configured? (Select two.)
A. Oracle Database 11g
B. Microsoft SQL Server 2005, SP2
C. Microsoft SQL Express, SP1
D. Microsoft SQL Server 2008
E. MySQL Database 5.5
Answer: B,D
Explanation:
QUESTION NO: 2
A guest is unable to download the On-Demand client. The guest is running Windows 7 64-bit and
connecting with the Mozilla Firefox browser. The computer has 512 MB RAM and 50 MB free disk
space. What is the likely cause of the problem?
A. The guests system has insufficient disk space.
B. The guests browser is unsupported.
C. The guests operating system is unsupported.
D. The guests system has insufficient RAM.
Answer: A
Explanation:
QUESTION NO: 3
In an Enforcer command line interface, which filter is used to capture communication traffic
between an Enforcer and a Symantec Endpoint Protection Manager?
A. auth
B. client
C. query
D. spm
Answer: D
买题库 QQ:860424807 2
Symantec ST0-135 Exam
Explanation:
QUESTION NO: 4
Which log contains IP address, connection attempt, port information, and the direction of the
connection?
A. Enforcer Client log
B. Enforcer Kernel log
C. Enforcer Traffic log
D. Enforcer Packet log
Answer: C
Explanation:
QUESTION NO: 5
An organization has deployed Symantec Network Access Control with LAN Enforcer. Historically,
all clients were Windows based endpoints. Now, Linux endpoints that authenticate with Microsoft
Active Directory will need to be authenticated through the LAN Enforcer. Which entry needs to be
added to the Switch Profi
您可能关注的文档
- RFID for Better Supply-Chain Management.pdf
- RICS_Valuation_Standards__6th_edition_-_Chinese中文.pdf
- Risk-Based Prioritization among Air Pollution Control Strategies.pdf
- Risk_of_coffee.pdf
- RLB_Hong_Kong_and_China_Report_September_2016.pdf
- Robust Channel Estimation and Detection for Uplink Control Channel in 3GPP-LTE.pdf
- Robust control of delay systems a sliding mode control design via LMI.pdf
- Robust control of nonlinear uncertain systems via sliding mode with backstepping design.pdf
- Robust model predictive control for nonlinear discrete time systems.pdf
- Robust Sampled-Data Control of Linear Singularly Perturbed Systems.pdf
文档评论(0)