1.
A guest with a Macintosh laptop without Symantec Endpoint Protection installed connects to an organizations wireless access point to browse a website. The organization uses Symantec Network Access Control with the On-Demand agent feature turned on. Which behavior will the guests laptop experience?
2.
A Help Desk technician determines that a client's Host Integrity event indicates it is failing a requirement, but the clients computer is still able to access the network, even after rerunning the check several times. Why will the clients Host Integrity status still pass?
3.
In a multi-site environment, which critical step must be manually taken prior to upgrading the Symantec Endpoint Protection Manager to the next major release?
4.
During a disaster recovery process, after reinstalling the Symantec Endpoint Protection Manager, what is the next manual step?
5.
How does the Gateway Enforcer function on the network?
6.
Which command parameter provides a valid method for establishing the shared secret between the Enforcer appliance and the Symantec Endpoint Protection Manager?
7.
How does a LAN Enforcer allow devices, such as IP phones, without a 802.1X supplicant running?
8.
In addition to the local database on LAN Enforcer and an upstream RADIUS server, which method is possible for MAC Authentication Bypass?
9.
A Host Integrity Antivirus Requirement has been configured, and the Host Integrity policy has been assigned and enabled. The requirement was defined as Any supported antivirus application. In which case must a specific product be defined?
10.
What is a Host Integrity rule template?