1.
What does Network Monitor use to identify network traffic going to a nonstandard port?
2.
What is a characteristic of the web-based installer?
3.
Symantec Operation Readiness Tools (SORT) provides which service?
4.
Which detection method includes keyword rules?
5.
What are two requirements for configuring disk-based I/O fencing on supported storage arrays? (Select two.)
6.
An employee recieved the following email notification: **************************************************************************** Dear Bob, Your email to jane_smith@partner.com with subject Account Info you requested violates the companys Customer Data Protection policy. If this is a legitimate business email, please add the word Encrypt in the subject line of the email. The communication will then be automatically sent to the recipient in an encrypted form, in accordance with company policy. Please note that this violation has also been reported to your manager. Confidential data protection is every employees responsibility. Thank you, Corporate Information Security Team **************************************************************************** Which recommended item is missing from this email notification?
7.
To which file system folder does PacketCapture write reconstructed SMTP messages?
8.
How is a policy applied to files found in Network Discover scans?
9.
How can an incident responder remediate multiple incidents simultaneously?
10.
Which Network Protect feature is a system administrator unable to configure?