Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Symantec 250-580 - Endpoint Security Complete - R2 Technical Specialist

Page: 4 / 5
Total 150 questions

An administrator selects the Discovered Items list in the ICDm to investigate a recent surge in suspicious file activity. What should an administrator do to display only high-risk files?

A.

Apply a list control.

B.

Apply a search rule

C.

Apply a search modifier

D.

Apply a list filter

An organization recently experienced an outbreak and is conducting a health check of the environment. What Protection Technology can the SEP team enable to control and monitor the behavior of applications?

A.

Host Integrity

B.

System Lockdown

C.

Application Control

D.

Behavior Monitoring (SONAR)

Which Symantec Endpoint Protection technology blocks a downloaded program from installing browser plugins?

A.

Intrusion Prevention

B.

SONAR

C.

Application and Device Control

D.

Tamper Protection

Files are blocked by hash in the deny list policy. Which algorithm is supported, in addition to MD5?

A.

SHA2

B.

SHA256

C.

SHA256 "salted"

D.

MD5 "Salted"

Which two (2) criteria are used by Symantec Insight to evaluate binary executables? (Select two.)

A.

Sensitivity

B.

Prevalence

C.

Confidentiality

D.

Content

E.

Age

What characterizes an emerging threat in comparison to the traditional threat?

A.

Emerging threats are more sophisticated than traditional threats.

B.

Emerging threats require artificial intelligence to be detected.

C.

Emerging threats are undetectable by signature-based engines.

D.

Emerging threats use new techniques and 0-day vulnerability to propagate.

The LiveUpdate Download Schedule is set to the default on the Symantec Endpoint Protection Manager (SEPM).

How many content revisions must the SEPM keep to ensure clients that check in to the SEPM every 10 days receive xdelta content packages instead of full content packages?

A.

10

B.

20

C.

30

D.

60

What is an appropriate use of a file fingerprint list?

A.

Allow unknown files to be downloaded with Insight

B.

Prevent programs from running

C.

Prevent Antivirus from scanning a file

D.

Allow files to bypass Intrusion Prevention detection

What type of Threat Defense for Active Directory alarms are displayed after domain misconfigurations or hidden backdoors are detected?

A.

Computer Information Gathering

B.

Pass-The-Ticket

C.

Credential Theft

D.

Dark Corners

How would an administrator specify which remote consoles and servers have access to the management server?

A.

Edit theServer Propertiesand under theGeneral tab,change theServer Communication Permission.

B.

Edit theCommunication Settingsfor the Group under theClients tab.

C.

EdittheExternal Communication Settingsfor the Group under theClients tab.

D.

Edit theSite Propertiesand under theGeneral tab,change the server priority.