About Symantec Critical System Protection
Symantec Critical System Protection represents new Symantec offerings providing security for the embedded and Internet of Things (IoT) devices.
Symantec Critical System Protection is an evolution of the existing Symantec Critical System Protection (SCSP) Client Edition, which has been specifically adapted with new features to secure devices in an IoT environment. These features include installing and running either intrusion prevention or intrusion detection features on managed or standalone devices, and updating the software, policies, and configurations on standalone agents without the need for direct connectivity with the Symantec Critical System Protection server.
Symantec Critical System Protection combines the signatureless policy-based protection and monitoring features, with portability and optimization through modularization, and easy updates using an over-the-air channel or a secure file share server.
Along with a wide variety of Windows and Linux platforms, Symantec Critical System Protection also supports RTOS (Real-time operating systems) such as QNX which is widely used in the Automotive, Healthcare, and Industrial verticals.
Symantec Critical System Protection provides a policy-based approach to endpoint security and compliance. The intrusion prevention and detection features of Symantec Critical System Protection operate across a broad range of platforms and applications. It provides:
A policy-based host security agent for monitoring and protection.
Proactive attack prevention using the least privilege containment approach.
Broad platform support for enterprise systems or embedded devices running Windows, Linux, or QNX.
Table: Symantec Critical System Protection capabilities
Security and protection
Compliance
Real-time proactive enforcement
Intrusion prevention
System hardening
Application control
Privileged user access control
Vulnerability and patch mitigation
Does not use signatures or require continual updates to content
Real-time monitoring and auditing
Host intrusion detection
File integrity monitoring
Configuration monitoring
Tracking and monitoring of user access
Logging and event reporting
The major features of Symantec Critical System Protection are as follows:
Intrusion detection facility for compliance auditing
Real-time file integrity monitoring
Granular change detection of registry values, file contents, and attributes
Operating system and application log monitoring
Local event correlation and smart response actions
Intrusion Prevention facility for malware prevention and system lockdown
Sandbox containment of operating system and application processes by an in-kernel reference monitor
Granular access control of network, file systems, registry, process-to-process memory access, system calls, and application and child process launches
Privileged user and program behavior
Comprehensive out-of-the-box policies for complete system monitoring and protection of physical and virtual systems
Centralized management environment for administering agents, policies, and events
Integration with Security Information and Event Management (SIEM) and other security tools, as well as enterprise infrastructure components such as Active Directory, SMTP, and SNMP
Broad platform support for enterprise systems or embedded devices running Windows, Linux, or QNX.
The major benefits of Symantec Critical System Protection are as follows:
Reduces emergency patching and minimizes patch-related downtime and IT expenses through proactive protection that does not require continuous updates.
Reduces incidents and remediation costs with continuous security. Once the agent has a policy, it enforces the policy even when the device is not connected to the corporate network. And even if a device is unable to obtain the latest patches in a timely fashion, Symantec Critical System Protection continues to block attacks so that the device is always protected.
Provides visibility and control over the security posture of business-critical enterprise assets.
Uses predefined compliance and hardening policies to provide efficient security management, reporting, alerting, and auditing of activities. Also provides compensating controls for compliance failures.
QUESTION 1
Which command removes the datadg02 disk from the datadg disk group?
A. vxassist datadg rmdisk datadg02
B. vxdg datadg rmdisk datadg02
C. vxassist datadg remove disk datadg02
D. vxdg datadg remove datadg02
Answer: B
QUESTION 2
Which states are displayed in the output of vxprint? (Choose two.)
A. Data
B. Kernel
C. File System
D. Volume
E. User
Answer: B,D
QUESTION 3
Which two statements are true about renaming a disk object? (Choose two.)
A. New disk names must be unique within the disk group.
B. All subdisks will be renamed together with the disk.
C. The disk group needs to be offline.
D. The new disk name must be unique within the system.
E. Subdisks names will remain the same.
Answer: A,E
QUESTION 4
What are valid mount options for a Veritas file system? (Choose two.)
A. nolargefiles
B. shared
C. logtmp
D. delaylog
E. logdelay
Answer: A,D
QUESTION 5
Which command grows the datavol volume by an additional 30 MB and resizes the file system at the same time?
A. vxassist -g datadg growby datavol 30m
B. vxresize -g datadg datavol 30m
C. vxresize -g datadg datavol +30m
D. vxassist -g datadg growto datavol 30m
Answer: C
Actualkey Symantec 250-250 exam pdf, Certkingdom Symantec 250-250 PDF
Best Symantec 250-250 Certification, Symantec 250-250 Training at certkingdom.com
Comments Off on 250-250 Veritas Storage Foundation 5.0 Administration for UNIX