Which two items are stored in the Symantec Endpoint Protection database? (Select two.)
A. Device Hardware IDs
B. User Defined Scans
C. Symantec Endpoint Protection Client for Linux
D. Symantec Endpoint Protection Client for Macintosh
E. Active Directory Synced Logon Credentials
Which task should an administrator perform to troubleshoot operation of the Symantec Endpoint Protection embedded database?
A. verify that dbsrv11.exe is listening on port 2638
B. check whether the MSSQLSERVER service is running
C. verify the sqlserver.exe service is running on port 1433
D. check the database transaction logs in X\Program Files\Microsoft SQL server
What is the file scan workflow order when Shared Insight Cache and reputation are enabled?
A. Symantec Insight > Shared Insight Cache server > local client Insight cache
B. local client Insight cache > Shared Insight Cache server > Symantec Insight
C. Shared Insight Cache server > local client Insight cache > Symantec Insight
D. local client Insight cache > Symantec Insight > Shared Insight Cache server
What is a function of Symantec Insight?
A. provides reputation ratings for structured data
B. enhances the capability of Group Update Providers (GUP)
C. increases the efficiency and effectiveness of LiveUpdate
D. provides reputation ratings for binary executables
Which Symantec Endpoint Protection component enables access to data through ad-hoc reports and charts with pivot tables?
A. Symantec Protection Center
B. Shared Insight Cache Server
C. Symantec Endpoint Protection Manager
D. IT Analytics
Which Symantec Endpoint Protection technology blocks a downloaded program from installing browser plugins?
A. Intrusion Prevention
B. SONAR
C. Application and Device Control
D. Tamper Protection
Which protection engine should be enabled to drop malicious vulnerability scans against a client system?
A. SONAR
B. Intrusion Prevention
C. Tamper Protection
D. Application and Device Control
Which protection technology can detect botnet command and control traffic generated on the Symantec Endpoint Protection client machine?
A. Insight
B. SONAR
C. Risk Tracer
D. Intrusion Prevention
Which technology can prevent an unknown executable from being downloaded through a browser session?
A. Browser Intrusion Prevention
B. Download Insight
C. Application Control
D. SONAR
Which Symantec Endpoint Protection defense mechanism provides protection against threats that propagate from system to system through the use of autorun.inf files?
A. Application and Device Control
B. SONAR
C. TruScan
D. Host Integrity
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Symantec exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ST0-134 exam preparations and Symantec certification application, do not hesitate to visit our Vcedump.com to find your solutions here.