Symantec 250-580 - Endpoint Security Complete - R2 Technical Specialist
Which antimalware intensity level is defined by the following: "Blocks files that are most certainly bad or potentially bad files results in a comparable number of false positives and false negatives."
What is the purpose of a Threat Defense for Active Directory Deceptive Account?
An Incident Responder has determined that an endpoint is compromised by a malicious threat. What SEDR feature would be utilized first to contain the threat?
An administrator notices that some entries list that the Risk was partially removed. The administrator needs to determine whether additional steps are necessary to remediate the threat.
Where in the Symantec Endpoint Protection Manager console can the administrator find additional information on the risk?
A company uses a remote administration tool that is detected as Hacktool.KeyLoggPro and quarantined by Symantec Endpoint Protection (SEP).
Which step can an administrator perform to continue using the remote administration tool without detection by SEP?
Which type of security threat is used by attackers to exploit vulnerable applications?
What tool can administrators use to create custom behavioral isolation policies based on collected application behavior data?
Where in the Attack Chain does Threat Defense for Active Directory provide protection?
What prevention technique does Threat Defense for Active Directory use to expose attackers?
What protection technology should an administrator enable to prevent double executable file names of ransomware variants like Cryptolocker from running?