EnsurepassQuestion 351 Which port must be allowed on the Gateway to permit server and client communication for synchronization? A. HTTPS 8080 B. HTTPS 443 C. TCP 80 D. TCP 2100   Answer: D      Question 352 Which port must be allowed on the Gateway to permit client heartbeats to the server? A. HTTPS 8080 B. HTTPS 443 C. TCP 2100 D. TCP 80   Answer: D      Question 353 Which alternate port must be allowed on the Gateway to permit client heartbeats Read more [...]
EnsurepassQuestion 341 You have encountered client performance issues that you have isolated to the policy. Of the choices below, what is the BEST way to resolve this issue? A. Reduce the number enforcement rules B. Duplicate the policy and redeploy C. Increase the antispyware scan intervals D. Group the number of enforcement rules   Answer: C      Question 342 Consider the following scenario: On an enterprise network with remote and local clients where Program Control Read more [...]
EnsurepassQuestion 331 When is a Personal Policy enforced? A. At all times unless overridden by an enterprise policy. B. At all times, and cannot be overridden. C. Only when connected from the network. D. Only when disconnected from the network.   Answer: A      Question 332 The Default Policy is applied to clients under which circumstance? When: A. the Client has a personal policy. B. the first login is waiting to begin. C. the Client is not licensed. D. another policy Read more [...]
EnsurepassQuestion 321 Which rules have precedence for inbound traffic? A. Internet B. Zone C. Program D. Firewall   Answer: D      Question 322 Using the preconfigured Medium Security setting for a Trusted Zone, what is the only traffic type that will be blocked? A. DNS incoming B. IGMP incoming C. NetBIOS incoming D. ICMP outgoing   Answer: D      Question 323 Which two types of installers are used to install Secure Access Windows clients? Read more [...]
EnsurepassQuestion 311 You are an Endpoint Security administrator with read/write access to entity, system, and administrator-related privileges, but you only have read access privileges to reports. What is your administrative role? A. System Administrator B. Policy Administrator C. Support Administrator D. Master Administrator   Answer: A      Question 312 During the Secure Access client boot process, the client driver takes control of network traffic, blocking inbound Read more [...]
EnsurepassQuestion 301 Which screen indicates the last time you can make changes to previous installation selections? A. Configuration Summary screen B. Install Complete screen C. Pre-Installation Summary screen D. Security Alert screen   Answer: A      Question 302 Which screen is the last time you can cancel the Secure Access Server installation by clicking "Cancel"? A. Pre-installation Summary screen B. Initial login screen C. Security Alert screen D. Install Complete Read more [...]
EnsurepassQuestion 291 Which embedded database does Endpoint Security Secure Access Server use? A. Oracle 9i B. Microsoft SQL Server C. Borland's JDataStore D. Penknife   Answer: C      Question 292 How is the Endpoint Security Secure Access management console accessed? A. Through SIC B. Using Secure Access Agent C. Using Secure Access management console port D. Through a Web browser   Answer: D      Question 293 How is the Endpoint Security Read more [...]
EnsurepassQuestion 281 Encryption takes place only after Full Disk Encryption: A. Off-loads the recovery file from the local machine. B. Stores the recovery file in a protected partition. C. Is installed on the local machine. D. Off-loads the recovery file to the remote server.   Answer: D      Question 282 Which component is not installed as part of a Full Disk Encryption installation? A. File encryption B. Secure user Data Base C. Monitoring tool D. Preboot authentication Read more [...]
EnsurepassQuestion 271 Under which two circumstances can user information be missed by the User Collector? A. 1, 5 B. 2, 5 C. 3, 4 D. 1, 3   Answer: D      Question 272 True or False. The User Collector has a limitation to the number of users that can be collected. A. False. There is no default limitation to the number of users that can be collected B. False. A limitation can be configured, but it is not the default setting C. True. This is set at 500,000 and cannot Read more [...]
EnsurepassQuestion 261 True or False. If User Collector has been configured to add non-AD related users to a Virtual Directory Structure, it will collect ONLY local Users. A. False. The VDS stores domain, device and user information as collected by User Collector, this will include local accounts if they are accessed when User Collector is polling. B. True. User Collector works only with Domain based accounts. C. True. The VDS stores domain, device and user information as collected by User Collector, Read more [...]
EnsurepassQuestion 252 The Directory Scanner's "uSNChanged" scanning technique's execution time is dependent on all of the following EXCEPT: A. Connection speed between the domain controller, directory scanner host and database host B. The processor speed of the domain controller, directory scanner host and database host C. Total number of objects in AD D. Total number of objects in SmartCenter for Pointsec - MI's database   Answer: D      Question 253 Directory Scanner Read more [...]
EnsurepassQuestion 241 A Warning appears in the logs that the directory scanner failed to scan Active Directory on its most recent scheduled scan. Which of the following is NOT a possible cause for this failure? A. The scanner cannot skip an object to read the next one B. The scanner was denied access to an object C. There is a corrupt object in Active Directory D. The scanner cannot read a specific OU   Answer: D      Question 242 Which of the following is the default Read more [...]