Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Symantec 250-580 - Endpoint Security Complete - R2 Technical Specialist

Page: 1 / 5
Total 150 questions

Which ICDm role is required in order to use LiveShell?

A.

Security Analyst

B.

Administrator

C.

Viewer

D.

Any

Why is it important for an Incident Responder to search for suspicious registry and system file changes when threat hunting?

A.

Attackers can establish persistence within an infected host

B.

Attackers can trick users into giving up their enterprise credentials

C.

Attackers may shadow valid sessions and inject hidden actions

D.

Attackers may cause unusual DNS requests

What type of policy provides a second layer of defense, after the Symantec firewall?

A.

Virus and Spyware

B.

Host Integrity

C.

Intrusion Prevention

D.

System Lockdown

Which type of event does operation:1indicate in a SEDR database search?

A.

File Deleted.

B.

File Closed.

C.

File Open.

D.

File Created.

When can an administrator add a new replication partner?

A.

Immediately following the first LiveUpdate session of the new site

B.

During a Symantec Endpoint Protection Manager upgrade

C.

During the initial installation of the new site

D.

Immediately following a successful Active Directory sync

Which Endpoint Setting should an administrator utilize to locate unmanaged endpoints on a network subnet?

A.

Device Discovery

B.

Endpoint Enrollment

C.

Discover and Deploy

D.

Discover Endpoints

Which alert rule category includes events that are generated about the cloud console?

A.

Security

B.

System

C.

Diagnostic

D.

Application Activity

Which Indicator of Compromise might be detected as variations in the behavior of privileged users that indicate that their account is being used by someone else to gain a foothold in an environment?

A.

Mismatched Port - Application Traffic

B.

Irregularities in Privileged User Account Activity

C.

Surges in Database Read Volume

D.

Geographical Irregularities

An Application Control policy includes an Allowed list and a Blocked list. A user wants to use an application that is neither on the Allowed list nor on the Blocked list. What can the user do to gain access to the application?

A.

Email the App Control Admin

B.

Request an Override

C.

Install the application

D.

Wait for the Application Drift process to complete

Which action is provided by Symantec EDR for the rapid remediation of impacted endpoints?

A.

Quickly filtering for specific attributes

B.

Detonate Memory Exploits in conjunction with SEP

C.

Automatically stopping suspicious behaviors & unknown threats

D.

Block Listing or Allow Listing of specific files