What happens when you enable egress filtering in Symantec Security Analytics?
ABlocks incoming network traffic
BBlocks outgoing network traffic
CAllows all traffic through
DEncrypts all outgoing emails
Explanation
Egress filtering restricts outgoing traffic, while other options either mischaracterize the function or are unrelated.
Q142
Which service enables efficient monitoring of data streams in Symantec Security Analytics?
ADataFlow Monitoring
BThreat Intelligence Cloud
CIncident Response Service
DAlert Management Tool
Explanation
DataFlow Monitoring allows analysis of data streams effectively; the others offer different functionalities.
Q143
A company needs to analyze log data from multiple sources. What configuration must be set up?
ASingle data collector only
BFederated collectors
CLocal storage only
DDirect USB import
Explanation
Federated collectors aggregate logs from various sources, while the others do not support multi-source aggregation.
Q144
What happens when you configure a data retention policy in Symantec Security Analytics?
AImmediate data encryption occurs
BOld data gets deleted immediately
CData is retained for specified period
DData is duplicated prior to retention
Explanation
The policy determines how long data is kept; the other options misinterpret retention functionality.
Q145
Which service does Symantec Security Analytics primarily provide?
AReal-time threat detection
BData backup management
CNetwork performance monitoring
DCloud storage solutions
Explanation
Symantec Security Analytics focuses on real-time threat detection, whereas the other options relate to different IT services.
Q146
A company needs to analyze network traffic for potential anomalies. What feature should they use?
AData Loss Prevention
BSecurity Information Event Management
CBehavior Analysis
DFile Integrity Monitoring
Explanation
Behavior Analysis identifies anomalies in network traffic, while other options focus on different aspects of security.
Q147
You are configuring user roles in Security Analytics. What happens if users are given 'read-only' access?
AThey can modify configurations
BThey can only view data
CThey can delete logs
DThey cannot access reports
Explanation
'Read-only' access allows users to view data without modifying it, contrary to other options that suggest higher privileges.
Q148
Which service helps safeguard against advanced persistent threats?
ASymantec Endpoint Protection
BSymantec Data Loss Prevention
CSymantec Cloud Security
DSymantec Backup Exec
Explanation
Symantec Endpoint Protection provides extensive security against advanced persistent threats, while others focus on data loss or backup.
Q149
A company needs to enforce encryption policies for sensitive data in transit. Which feature should they implement?
ASSL Inspection
BEndpoint Protection
CWeb Filtering
DData Loss Prevention
Explanation
SSL Inspection allows for the enforcement of encryption policies for data in transit, unlike others that focus on endpoint or web security.
Q150
What happens when you disable logging in Symantec Security Analytics?
AIncreased performance of system
BLoss of real-time threat visibility
CEasier compliance with regulations
DReduced user permissions
Explanation
Disabling logging results in the loss of real-time threat visibility, contrary to the misleading implications of the other options.