Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

250-580 Endpoint Security Complete - R2 Technical Specialist is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

250-580 Practice Questions

Endpoint Security Complete - R2 Technical Specialist

Last Update 23 hours ago
Total Questions : 150

Dive into our fully updated and stable 250-580 practice test platform, featuring all the latest Endpoint Security exam questions added this week. Our preparation tool is more than just a Symantec study aid; it's a strategic advantage.

Our free Endpoint Security practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 250-580. Use this test to pinpoint which areas you need to focus your study on.

250-580 PDF

250-580 PDF (Printable)
$54.25
$154.99

250-580 Testing Engine

250-580 PDF (Printable)
$59.5
$169.99

250-580 PDF + Testing Engine

250-580 PDF (Printable)
$74.55
$212.99
Question # 11

Which rule types should be at the bottom of the list when an administrator adds device control rules?

Options:

A.  

Specific "device type" rules

B.  

Specific "device model" rules

C.  

General "catch all" rules

D.  

General "brand defined" rules

Discussion 0
Question # 12

An organization identifies a threat in its environment and needs to limit the spread of the threat. How should the SEP Administrator block the threat using Application and Device Control?

Options:

A.  

Gather the MD5 hash of the file and create an Application Content Rule that blocks the file based on the file fingerprint.

B.  

Gather the process name of the file and create an Application Content Rule that blocks the file based on the device ID type.

C.  

Gather the MD5 hash of the file and create an Application Content Rule that uses regular expression matching.

D.  

Gather the MD5 hash of the file and create an Application Content Rule that blocks the file based on specific arguments.

Discussion 0
Question # 13

Which report template type should an administrator utilize to create a daily summary of network threats detected?

Options:

A.  

Intrusion Prevention Report

B.  

Blocked Threats Report

C.  

Network Risk Report

D.  

Access Violation Report

Discussion 0
Question # 14

If an administrator enables the setting to manage policies from the cloud, what steps must be taken to reverse this process?

Options:

A.  

Navigate to ICDm > Enrollment and disable the setting

B.  

Unenroll the SEPM > Disable the setting > Re-enroll the SEPM

C.  

Revoke policies from ICDm

D.  

Revoke policies from SEPM

Discussion 0
Question # 15

What is the purpose of a Threat Defense for Active Directory Deceptive Account?

Options:

A.  

It prevents attackers from reading the contents of the Domain Admins Group.

B.  

It assigns a fake NTLM password hash value for users with an assigned AdminCount attribute.

C.  

It exposes attackers as they seek to gather credential information from workstation memory.

D.  

It acts as a honeypot to expose attackers as they attempt to build their AD treasure map

Discussion 0
Question # 16

Which two (2) criteria are used by Symantec Insight to evaluate binary executables? (Select two.)

Options:

A.  

Sensitivity

B.  

Prevalence

C.  

Confidentiality

D.  

Content

E.  

Age

Discussion 0
Question # 17

An administrator notices that some entries list that the Risk was partially removed. The administrator needs to determine whether additional steps are necessary to remediate the threat.

Where in the Symantec Endpoint Protection Manager console can the administrator find additional information on the risk?

Options:

A.  

Risk log

B.  

Computer Status report

C.  

Notifications

D.  

Infected and At-Risk Computers report

Discussion 0
Question # 18

Which IPS signature type is primarily used to identify specific unwanted network traffic?

Options:

A.  

Attack

B.  

Audit

C.  

Malcode

D.  

Probe

Discussion 0
Question # 19

Which two (2) instances could cause Symantec Endpoint Protection to be unable to remediate a file? (Select two.)

Options:

A.  

Another scan is in progress.

B.  

The detected file is in use.

C.  

There are insufficient file permissions.

D.  

The file is marked for deletion by Windows on restart.

E.  

The file has good reputation.

Discussion 0
Question # 20

An Application Control policy includes an Allowed list and a Blocked list. A user wants to use an application that is neither on the Allowed list nor on the Blocked list. What can the user do to gain access to the application?

Options:

A.  

Email the App Control Admin

B.  

Request an Override

C.  

Install the application

D.  

Wait for the Application Drift process to complete

Discussion 0
Get 250-580 dumps and pass your exam in 24 hours!

Free Exams Sample Questions