1.Look at the picture.
Drag and drop question. Drag the items to the proper locations.
Correct Answers:
2.Look at the picture.
Drag and drop question. Drag the items to the proper locations.
Correct Answers:
3.What is the first activity that is conducted in an IPS mode implementation?
A: Create a Rule from a Query
B: Tune for False Positives
C: Install the Sensor, Schedule a Network Outage Prior to the Installation
D: Fine Tune the Custom Policy
Correct Answers: C
4.Which two tasks are part of conducting a discovery workshop in the Physical Design Workshop service component? (Choose two.)
A:Define Policies and Groups
B:Create a Network Diagram
C:Discuss the Customer's System Implementation Strategy
D:Create a Design Specification Document
E:Perform Risk Mitigation
Correct Answers: C, E
5.What is a key objective within the Business Case Alignment service component in the optimize phase?
A: Clearly articulate the customer's pain points and motivation to change
B: Conduct an analysis of the customer's security posture after the system has been in operation over time
C: Document integration/migration requirements for new solution
D: Present the system readiness assessment report
E: Gather implementation requirements
F: Conduct a discovery workshop
Correct Answers: B
6.The Business Requirements Development service component in the prepare phase can help to document which of the following in a customer environment? (Choose two.)
A:Project Scope and Plan
B:Logical-Level System Functionality
C:Security Solution Feature and Function Specifications
D:Security Alerts and Notification Requirements
E:System Level Functionality
F:Physical Topology Maps
Correct Answers: B, F
7.Which resource is the most critical in writing a custom CSA policy?
A: Technology Requirements Document
B: CSA Reference Customer Policy
C: CSA Installation Guide
D: CSA Agent Profiler
Correct Answers: D
8.Which activity is performed in Security Readiness Assessment?
A: Assess Existing Software Operations Procedures
B: Survey Facility Site
C: Preliminary Technology Discovery
D: Assessment and Remediation Planning
Correct Answers: A
9.Which key task is conducted as part of Problem Management?
A: Remotely Backup Endpoint Solution Configuration and Databases
B: Provide Software Upgrades, Updates, and Bug Fixes for the Endpoint Solution System
C: Conduct Move, Adds, Changes
D: Select Fault Management Tools and Products
Correct Answers: B
10.Which two service components are performed during the implement phase? (Choose two.)
A:Security Readiness Assessment
B:Staff Training
C:Site Readiness Specification
D:Project Kickoff
E:Configuration Management
F:Design Review
Correct Answers: B, D
版权与免责声明
1、本站所发布的文章仅供技术交流参考,本站不主张将其做为决策的依据,浏览者可自愿选择采信与否,本站不对因采信这些信息所产生的任何问题负责。
2、本站部分文章来源于网络,其版权为原权利人所有。由于来源之故,有的文章未能获得作者姓名,署“未知”或“佚名”。对于这些文章,有知悉作者姓名的请告知本站,以便及时署名。如果作者要求删除,我们将予以删除。除此之外本站不再承担其它责任。
3、本站部分文章来源于本站原创,本站拥有所有权利。
4、如对本站发布的信息有异议,请联系我们,经本站确认后,将在三个工作日内做出修改或删除处理。
请参阅权责声明!