1.
Which two databases are supported when Symantec Endpoint Protection Manager is being configured? (Select two.)
2.
A guest is unable to download the On-Demand client. The guest is running Windows 7 64-bit and connecting with the Mozilla Firefox browser. The computer has 512 MB RAM and 50 MB free disk space. What is the likely cause of the problem?
3.
In an Enforcer command line interface, which filter is used to capture communication traffic between an Enforcer and a Symantec Endpoint Protection Manager?
4.
Which log contains IP address, connection attempt, port information, and the direction of the connection?
5.
An organization has deployed Symantec Network Access Control with LAN Enforcer. Historically, all clients were Windows based endpoints. Now, Linux endpoints that authenticate with Microsoft Active Directory will need to be authenticated through the LAN Enforcer. Which entry needs to be added to the Switch Profile Action table to open the port for Linux endpoints once they have been authenticated through Active Directory user credentials?
6.
How can an administrator provide computers on a quarantine VLAN with access to remediation materials without using static routes?
7.
The 802.1x protocol has three major components: Supplicant, Authenticator and Authentication Server. Which elements serve each of these components when Symantec Network Access Control is being configured to use LAN Enforcement?
8.
A Host Integrity policy has a complex custom conditional check that has three IF THEN statements, two of which have ELSE statements. How many ENDIF statements are required?

 
9.
An organization with a Gateway Enforcer behind a VPN concentrator that is performing NAT, determines that clients are being blocked. What is the most likely cause of the problem?
10.
When a Gateway Enforcer is being deployed, which port needs to be kept open between the clients and the Enforcer?