Symantec 250-580 - Endpoint Security Complete - R2 Technical Specialist
An administrator selects the Discovered Items list in the ICDm to investigate a recent surge in suspicious file activity. What should an administrator do to display only high-risk files?
An organization recently experienced an outbreak and is conducting a health check of the environment. What Protection Technology can the SEP team enable to control and monitor the behavior of applications?
Which Symantec Endpoint Protection technology blocks a downloaded program from installing browser plugins?
Files are blocked by hash in the deny list policy. Which algorithm is supported, in addition to MD5?
Which two (2) criteria are used by Symantec Insight to evaluate binary executables? (Select two.)
What characterizes an emerging threat in comparison to the traditional threat?
The LiveUpdate Download Schedule is set to the default on the Symantec Endpoint Protection Manager (SEPM).
How many content revisions must the SEPM keep to ensure clients that check in to the SEPM every 10 days receive xdelta content packages instead of full content packages?
What is an appropriate use of a file fingerprint list?
What type of Threat Defense for Active Directory alarms are displayed after domain misconfigurations or hidden backdoors are detected?
How would an administrator specify which remote consoles and servers have access to the management server?