1.
Which method can be used to upgrade a Symantec Endpoint Protection Manager to include Symantec Network Access Control functionality?
2.
What is the Symantec recommended first step in upgrading the Symantec Endpoint Protection Manager to the next release?
3.
What is a valid deployment methodology for updating the version of Symantec Network Access Control client?
4.
From which log can an administrator determine that the Enforcer has successfully registered with the Symantec Endpoint Protection Manager?
5.
When testing 802.1x environments with LAN enforcement, where can an administrator confirm whether the user credentials provided by a client are accepted or rejected?
6.
After the Symantec Endpoint Protection Manager is installed, what is the correct sequence of steps for implementing the On-Demand client?
7.
An unmanaged guest endpoint is permitted onto the production VLAN with 802.1x enabled on the switch port and a guest VLAN is configured. The guest endpoint is sent to a guest VLAN. What is the reason this is occurring?
8.
What can trigger a Symantec Endpoint Protection client to switch locations?
9.
A computer that has been taken outside of an organization's network is unable to gain access to any network resources. The Endpoint Protection Client reports that Host Integrity has failed and is quarantined. What is the most likely cause of the failure?
10.
An organization applies a Host Integrity policy that runs a custom script to check for an application patch for its proprietary accounting software. The Help Desk technician receives reports from the accounting department that at regular intervals a command prompt appears briefly on users' desktops and then disappears. What is the most likely cause?