How are permissions to user-defined objects granted to individual users?
A. A custom role must be created to grant access.
B. The administrator must manually assign permissions.
C. Permissions are automatically assigned by role.
D. They are granted through Active Directory.
正解:B
質問 2:
A business unit is generating a large number of high severity incidents on a Network Prevent credit card policy.
What are two likely causes? (Select two.)
A. The policy is unable to detect corporate security policies with respect to credit cards.
B. A business process within the business unit violates corporate security policies.
C. The business unit's employees may be unaware of correct credit card handling procedures.
D. The business unit's employees are copying credit card data to removable drives.
E. The business unit's employees are storing credit card data insecurely on a local file share.
正解:B,C
質問 3:
A user wants to modify a check within a pre-defined standard.
What is the first step?
A. Right-click the check and select Edit
B. Make a copy of the check
C. Highlight check and browse to the Expression tab
D. Highlight check and browse to the Parameters tab
正解:B
質問 4:
Where are evaluation results stored?
A. Evidence database
B. Response database
C. Production database
D. Reporting database
正解:C
質問 5:
An organization needs to determine whether anyone other than the CEO is emailing PDF documents that contain the phrase "Revenue Operating Report".
What is the most efficient way to write this policy and generate the fewest false positives?
A. One rule with two conditions and one exception rule
B. Two rules with one condition each and one exception rule
C. One rule without conditions and one exception rule
D. Two rules and one L7 Sender exception
正解:A
質問 6:
When collecting data from assets, what is the primary factor in determining the types of data that will be collected?
A. reference asset
B. baseline
C. scope
D. standard
正解:D
質問 7:
If a customer is running Enterprise Security Manager (ESM) 6.5.x in their environment, which two ESM components must be upgraded for it to work with Symantec Control Compliance Suite 9.0? (Select two.)
A. ESM agent
B. ESM console
C. ESM reporting
D. ESM relation database link
E. ESM manager
正解:B,E
質問 8:
What should be used to exclude emails going to any email address in the partner.com domain across all policies?
A. Content filter
B. L7 filter
C. Sender/User Matches pattern
D. IP filter
正解:B
質問 9:
Within an evaluation result, the status Unknown is primarily defined with which check setting?
A. check expression
B. data items filter
C. precondition
D. missing data items
正解:D
高桥** -
Pass4Testは様々な工夫がなされており、250-512合格者の思考力が身に付く。