Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

250-580 Exam Dumps - Symantec Certification Questions and Answers

Question # 34

Which Incident View widget shows the parent-child relationship of related security events?

Options:

A.

The Incident Summary Widget

B.

The Process Lineage Widget

C.

The Events Widget

D.

The Incident Graph Widget

Buy Now
Question # 35

Which technology can prevent an unknown executable from being downloaded through a browser session?

Options:

A.

Intrusion Prevention

B.

Insight

C.

Application Control

D.

Advanced Machine Learning

Buy Now
Question # 36

Which Firewall rule components should an administrator configure to blockfacebook.comuse during business hours?

Options:

A.

Host(s), Network Interface, and Network Service

B.

Application, Host(s), and Network Service

C.

Action, Hosts(s), and Schedule

D.

Action, Application, and Schedule

Buy Now
Question # 37

Which Incident View widget shows the parent-child relationship of related security events?

Options:

A.

The Incident Summary Widget

B.

The Process Lineage Widget

C.

The Events Widget

D.

The Incident Graph Widget

Buy Now
Question # 38

What is the timeout for the file deletion command in SEDR?

Options:

A.

2 Days

B.

7 Days

C.

72 Hours

D.

5 Days

Buy Now
Question # 39

Which Endpoint Setting should an administrator utilize to locate unmanaged endpoints on a network subnet?

Options:

A.

Device Discovery

B.

Endpoint Enrollment

C.

Discover and Deploy

D.

Discover Endpoints

Buy Now
Question # 40

What EDR feature provides endpoint activity recorder data for a file hash?

Options:

A.

Process Dump

B.

Entity Dump

C.

Hash Dump

D.

Full Dump

Buy Now
Question # 41

What does a medium-priority incident indicate?

Options:

A.

The incident may have an impact on the business

B.

The incident can result in a business outage

C.

The incident does not affect critical business operation

D.

The incident can safely be ignored

Buy Now
Question # 42

What is the purpose of a Threat Defense for Active Directory Deceptive Account?

Options:

A.

It prevents attackers from reading the contents of the Domain Admins Group.

B.

It assigns a fake NTLM password hash value for users with an assigned AdminCount attribute.

C.

It exposes attackers as they seek to gather credential information from workstation memory.

D.

It acts as a honeypot to expose attackers as they attempt to build their AD treasure map

Buy Now
Question # 43

Which type of security threat continues to threaten endpoint security after a system reboot?

Options:

A.

file-less

B.

memory attack

C.

script

D.

Rootkit

Buy Now
Exam Code: 250-580
Exam Name: Endpoint Security Complete - R2 Technical Specialist
Last Update: Feb 23, 2025
Questions: 150
250-580 pdf

250-580 PDF

$25.5  $84.99
250-580 Engine

250-580 Testing Engine

$28.5  $94.99
250-580 PDF + Engine

250-580 PDF + Testing Engine

$40.5  $134.99