What happens when the logging threshold is exceeded in Symantec Security Analytics?
AOlder logs are deleted
BSystem performance improves
CLogs stop being recorded
DNew logs overwrite existing ones
Explanation
Older logs are deleted to free space, while other options inaccurately describe system behavior.
Q22
Which service collects and analyzes security data in real-time?
ASecurity Information and Event Management (SIEM)
BData Loss Prevention (DLP)
CNetwork Access Control (NAC)
DEndpoint Protection Platform (EPP)
Explanation
SIEM collects real-time security data; others serve different functions.
Q23
A company needs to ensure data is encrypted in transit. Which technology should they implement?
AVPN (Virtual Private Network)
BFirewall
CIntrusion Detection System (IDS)
DNetwork Packet Broker
Explanation
VPNs encrypt data during transmission; firewalls don't encrypt data.
Q24
What happens when a user exceeds their quota in a Storage Policy?
AAccess is immediately denied.
BData deletion is automatically triggered.
CUser is notified but can continue.
DQuota increases automatically.
Explanation
Users are usually informed and can continue; access isn't immediately denied unless policies enforce it.
Q25
Which service is responsible for event correlation in Symantec Security Analytics?
AIntelligence Service
BData Lake Service
CThreat Detection Service
DIncident Response Service
Explanation
The Intelligence Service performs event correlation to identify threats, while others do not focus specifically on this function.
Q26
A company needs to analyze network traffic for anomalies. What configuration should you prioritize?
ASetting up a firewall rule
BDeploying an IDS system
CConfiguring traffic flow policies
DImplementing a VPN solution
Explanation
Configuring traffic flow policies is essential for analyzing network traffic, whereas the other options do not directly facilitate detailed analysis.
Q27
What happens when you set a low threshold for alerts in Symantec Security Analytics?
AFewer alerts are generated
BMore false positives occur
CDetection capabilities improve
DSystem performance decreases significantly
Explanation
A low threshold increases the likelihood of false positives, while other options misrepresent the effects of such a setting.
Q28
Which service is primarily used for threat intelligence in Symantec Security Analytics?
AInsight Cloud
BData Loss Prevention
CThreat Hunter
DEvent Management
Explanation
Threat Hunter is designed for threat intelligence, while the others serve different security purposes.
Q29
A company needs to identify user behaviors that deviate from the norm. Which feature of Symantec Security Analytics should they use?
AAnomaly Detection
BReal-time Monitoring
CLog Management
DIncident Response
Explanation
Anomaly Detection specifically focuses on identifying unusual user behaviors, unlike the other options.
Q30
What happens when an incident is marked as ‘resolved’ in Symantec Security Analytics?
AIt is permanently deleted.
BIt enters a closed status.
CIt is escalated to management.
DIt triggers an automated response.
Explanation
Marking an incident as ‘resolved’ changes its status to closed, while the other options are inaccurate outcomes.