1.
What is a critical success factor when implementing workflow software?
2.
An organization would like to implement a solution that will correlate and analyze security log data to help them identify threats. Which strategy is appropriate for this organization?
3.
Which statement reflects a risk-based security program?
4.
How does a workflow solution work with collaborative applications?
5.
A customer is experiencing image-based spam and phishing attacks that are negatively impacting messaging flow. Which Symantec solution should be recommended to this customer?
6.
Which information does an organization need to analyze in order to apply a risk-based approach to their security and compliance practices, according to the Security Solutions 1.0 course?
7.
Which information from a customer helps to uncover a need for Symantec Data Loss Prevention?
8.
Which trend did Art Gilliland discuss in the Security Solutions 1.0 course as a primary driver for the security vision of Symantec?
9.
Which Symantec solution informs an administrator that a particular server has excessive file system rights?
10.
What is the name of the Symantec solution designed to develop and enforce IT policies?