1.
When querying archived event data, how can you make a query available to other users of the system?
2.
Which Symantec Security Information Manager feature provides a centralized list of the hosts and devices in a network that are subject to security event correlation?
3.
What are two ways in which new entries can be added to the Assets Table of a Symantec Security Information Manager solution?
4.
Which statement is true about rules in a Symantec Security Information Manager solution?
5.
Which three ratings does the Information Manager Assets Table use to quantify the importance of the device and help determine how to escalate security incidents related to that device? "First Test, First Pass." - www.lead2pass.com/ST0-085.html 54 Symantec ST0-085 Exam
6.
Which pre-defined Symantec Security Information Manager Assets Table policy follows the standards set by United States law, which requires accountability of financial reporting for public companies?
7.
How is vulnerability information added to asset properties in the Assets Table?
8.
Using built-in functionality, what are three ways the Assets Table can reduce the reporting of false "First Test, First Pass." - www.lead2pass.com/ST0-085.html 55 Symantec ST0-085 Exam positive security incidents?
9.
How can you determine which ports are potentially vulnerable on a given host in the Assets Table?
10.
What information is reported by the Nessus scanner when it scans a range of network addresses?