Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Symantec 250-580 - Endpoint Security Complete - R2 Technical Specialist

Page: 3 / 5
Total 150 questions

What should an administrator know regarding the differences between a Domain and a Tenant in ICDm?

A.

A tenant can contain multiple domains

B.

Each customer can have one domain and many tenants

C.

A domain can contain multiple tenants

D.

Each customer can have one tenant and no domains

When configuring Network Integrity, why is it a requirement to add trusted certificates?

A.

To allow enterprise SSL decryption for security scanning

B.

To secure the connection to ICDm

C.

To allow a trusted VPN connection

D.

To bypass an attacker's MITM proxy

Which other items may be deleted when deleting a malicious file from an endpoint?

A.

Registry entries that point to that file

B.

The incident related to the file

C.

SEP Policies related to that file

D.

Files and libraries that point to that file

An organization is considering a single site for their Symantec Endpoint Protection environment. What are two (2) reasons that the organization should consider? (Select two)

A.

Organizational merger

B.

Sufficient WAN bandwidth

C.

Delay-free, centralized reporting

D.

24x7 admin availability

E.

E.Legal constraints

Which of the following are considered entities in SES Complete?

A.

Endpoint, File, Process

B.

Domain, Endpoint, Process

C.

Domain, File, Process

D.

Domain, Endpoint, File

What does a ranged query return or exclude?

A.

Data matching the exact field names and their values

B.

Data matching a regular expression

C.

Data falling between two specified values of a given field

D.

Data based on specific values for a given field

When are events generated within SEDR?

A.

When an incident is selected

B.

When an activityoccurs

C.

When any event is opened

D.

When entities are viewed

What information is required to calculate retention rate?

A.

Number of endpoints, EAR data per endpoint per day, available disk space, number of endpoint dumps, dump size

B.

Number of endpoints, available bandwidth, available disk space, number of endpoint dumps, dump size

C.

Number of endpoints, available bandwidth, number of days to retain, number of endpoint dumps, dump size

D.

Number of endpoints, EAR data per endpoint per day, number of days to retain, number of endpoint dumps, dump size

On which platform is LiveShell available?

A.

Windows

B.

All

C.

Linux

D.

Mac

How should an administrator set up an alert to be notified when manual remediation is needed on an endpoint?

A.

Add a Single Risk Event notification and specify "Left Alone" for the action taken. Choose to log the notification and send an e-mail to the system administrators.

B.

Add a Client security alert notification and specify "Left Alone" for the action taken. Choose to log the notification and send an e-mail to the system administrators.

C.

Add a System event notification and specify "Left Alone" for the action taken. Choose to log the notification and send an e-mail to the system administrators.

D.

Add a New risk detected notification and specify "Left Alone" for the action taken. Choose to log the notification and send an emailto the system administrators.