Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

250-580 Exam Dumps - Symantec Certification Questions and Answers

Question # 14

Files are blocked by hash in the deny list policy. Which algorithm is supported, in addition to MD5?

Options:

A.

SHA2

B.

SHA256

C.

SHA256 "salted"

D.

MD5 "Salted"

Buy Now
Question # 15

Why is Active Directory a part of nearly every targeted attack?

Options:

A.

AD administrationis managed by weak legacy APIs.

B.

AD is, by design, an easily accessed flat file name space directory database

C.

AD exposes all of its identities, applications, and resources to every endpoint in the network

D.

AD user attribution includes hidden elevated admin privileges

Buy Now
Question # 16

What prevention technique does Threat Defense for Active Directory use to expose attackers?

Options:

A.

Process Monitoring

B.

Obfuscation

C.

Honeypot Traps

D.

Packet Tracing

Buy Now
Question # 17

Administrators at a company share a single terminal for configuring Symantec Endpoint Protection. The administrators want to ensure that each administrator using the console is forced to authenticate using their individual credentials. They are concerned that administrators may forget to log off the terminal, which would easily allow others to gain access to the Symantec Endpoint Protection Manager (SEPM) console.

Which setting should the administrator disable to minimize the risk of non-authorized users logging into the SEPM console?

Options:

A.

Allow users to save credentials when logging on

B.

Delete clients that have not connected for specified time

C.

Lock account after the specified number of unsuccessful logon attempts

D.

Allow administrators to reset passwords

Buy Now
Question # 18

What feature is used to get a comprehensive picture of infected endpoint activity?

Options:

A.

Entity View

B.

Process View

C.

Full Dump

D.

Endpoint Dump

Buy Now
Question # 19

Which security control is complementary to IPS, providing a second layer of protection against network attacks?

Options:

A.

Host Integrity

B.

Network Protection

C.

Antimalware

D.

Firewall

Buy Now
Question # 20

An organization identifies a threat in its environment and needs to limit the spread of the threat. How should the SEP Administrator block the threat using Application and Device Control?

Options:

A.

Gather the MD5 hash of the file and create an Application Content Rule that blocks the file based on the file fingerprint.

B.

Gather the process name of the file and create an Application Content Rule that blocks the file based on the device ID type.

C.

Gather the MD5 hash of the file and create an Application Content Rule that uses regular expression matching.

D.

Gather the MD5 hash of the file and create an Application Content Rule that blocks the file based on specific arguments.

Buy Now
Question # 21

The SES Intrusion Prevention System has blocked an intruder's attempt to establish an IRC connection inside the firewall. Which Advanced Firewall Protection setting should an administrator enable to prevent the intruder's system from communicating with the network after the IPS detection?

Options:

A.

Enable port scan detection

B.

Automatically block an attacker's IP address

C.

Block all traffic until the firewall starts and after the firewall stops

D.

Enable denial of service detection

Buy Now
Question # 22

An Application Control policy includes an Allowed list and a Blocked list. A user wants to use an application that is neither on the Allowed list nor on the Blocked list. What can the user do to gain access to the application?

Options:

A.

Email the App Control Admin

B.

Request an Override

C.

Install the application

D.

Wait for the Application Drift process to complete

Buy Now
Question # 23

How would an administrator specify which remote consoles and servers have access to the management server?

Options:

A.

Edit theServer Propertiesand under theGeneral tab,change theServer Communication Permission.

B.

Edit theCommunication Settingsfor the Group under theClients tab.

C.

EdittheExternal Communication Settingsfor the Group under theClients tab.

D.

Edit theSite Propertiesand under theGeneral tab,change the server priority.

Buy Now
Exam Code: 250-580
Exam Name: Endpoint Security Complete - R2 Technical Specialist
Last Update: Feb 23, 2025
Questions: 150
250-580 pdf

250-580 PDF

$25.5  $84.99
250-580 Engine

250-580 Testing Engine

$28.5  $94.99
250-580 PDF + Engine

250-580 PDF + Testing Engine

$40.5  $134.99