Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

250-580 Exam Dumps - Symantec Certification Questions and Answers

Question # 4

A user is unknowingly about to connect to a malicious website and download a known threat within a .rar file. All Symantec Endpoint Protection technologies are installed on the client's system.

In which feature set order must the threat pass through to successfully infect the system?

Options:

A.

Download Insight, Firewall, IPS

B.

Firewall, IPS, Download Insight

C.

IPS, Firewall, Download Insight

D.

Download Insight, IPS, Firewall

Buy Now
Question # 5

An organization recently experienced an outbreak and is conducting a health check of the environment. What Protection Technology can the SEP team enable to control and monitor the behavior of applications?

Options:

A.

Host Integrity

B.

System Lockdown

C.

Application Control

D.

Behavior Monitoring (SONAR)

Buy Now
Question # 6

What does a ranged query return or exclude?

Options:

A.

Data matching the exact field names and their values

B.

Data matching a regular expression

C.

Data falling between two specified values of a given field

D.

Data based on specific values for a given field

Buy Now
Question # 7

What permissions does the Security Analyst Role have?

Options:

A.

Trigger dumps, get & quarantine files, enroll new sites

B.

Search endpoints, trigger dumps, get & quarantine files

C.

Trigger dumps, get & quarantine files, create device groups

D.

Search endpoints, trigger dumps, create policies

Buy Now
Question # 8

Which two (2) criteria are used by Symantec Insight to evaluate binary executables? (Select two.)

Options:

A.

Sensitivity

B.

Prevalence

C.

Confidentiality

D.

Content

E.

Age

Buy Now
Question # 9

Which report template type should an administrator utilize to create a daily summary of network threats detected?

Options:

A.

Intrusion Prevention Report

B.

Blocked Threats Report

C.

Network Risk Report

D.

Access Violation Report

Buy Now
Question # 10

An administrator changes the Virus and Spyware Protection policy for a specific group that disables Auto-Protect. The administrator assigns the policy and the client systems apply the corresponding policy serial number. Upon visual inspection of a physical client system, the policy serial number is correct. However, Auto-Protect is still enabled on the client system.

Which action should the administrator take to ensure that the desired setting is in place for the client?

Options:

A.

Restart the client system

B.

Run a command on the computer to Update Content

C.

Enable the padlock next to the setting in the policy

D.

Withdraw the Virus and Spyware Protection policy

Buy Now
Question # 11

Which term or expression is utilized when adversaries leverage existing tools in the environment?

Options:

A.

opportunistic attack

B.

file-less attack

C.

script kiddies

D.

living off the land

Buy Now
Question # 12

An administrator notices that some entries list that the Risk was partially removed. The administrator needs to determine whether additional steps are necessary to remediate the threat.

Where in the Symantec Endpoint Protection Manager console can the administrator find additional information on the risk?

Options:

A.

Risk log

B.

Computer Status report

C.

Notifications

D.

Infected and At-Risk Computers report

Buy Now
Question # 13

What does the Endpoint Communication Channel (ECC) 2.0 allow Symantec EDR to directly connect to?

Options:

A.

SEDR Cloud Console

B.

Synapse

C.

SEP Endpoints

D.

SEPM

Buy Now
Exam Code: 250-580
Exam Name: Endpoint Security Complete - R2 Technical Specialist
Last Update: Feb 22, 2025
Questions: 150
250-580 pdf

250-580 PDF

$25.5  $84.99
250-580 Engine

250-580 Testing Engine

$28.5  $94.99
250-580 PDF + Engine

250-580 PDF + Testing Engine

$40.5  $134.99