1.
Which role is able to modify permissions within the Symantec Security Information Manager solution?
2.
How many days of data is stored in the archives before it is purged?
3.
Which is commonly used to view archived events?
4.
When querying archived event data, how can you make a query available to other users of the system?
5.
What is the common way in which new entries can be added to the Assets Table of a Symantec Security Information Manager solution?
6.
Which statement is true about rules in a Symantec Security Information Manager solution?
7.
How can you determine which ports are potentially vulnerable on a given host in the Assets Table?
8.
What information is reported by the Nessus scanner when it scans a range of network addresses?
 
9.
Which service provides Symantec Security Information Manager with updated intelligence about threats?
10.
What does the Correlation Engine do once custom rules are properly defined?