Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

250-580 Exam Questions Tutorials

Page: 10 / 11
Question 40

What type of policy provides a second layer of defense, after the Symantec firewall?

Options:

A.

Virus and Spyware

B.

Host Integrity

C.

Intrusion Prevention

D.

System Lockdown

Question 41

What happens when an administrator adds a file to the deny list?

Options:

A.

The file is assigned to a chosen Deny List policy

B.

The file is assigned to the Deny List task list

C.

The file is automatically quarantined

D.

The file is assigned to the default Deny List policy

Question 42

Files are blocked by hash in the deny list policy. Which algorithm is supported, in addition to MD5?

Options:

A.

SHA2

B.

SHA256

C.

SHA256 "salted"

D.

MD5 "Salted"

Question 43

What does the Endpoint Communication Channel (ECC) 2.0 allow Symantec EDR to directly connect to?

Options:

A.

SEDR Cloud Console

B.

Synapse

C.

SEP Endpoints

D.

SEPM

Page: 10 / 11
Exam Code: 250-580
Exam Name: Endpoint Security Complete - R2 Technical Specialist
Last Update: Nov 24, 2024
Questions: 150
250-580 pdf

250-580 PDF

$25.5  $84.99
250-580 Engine

250-580 Testing Engine

$28.5  $94.99
250-580 PDF + Engine

250-580 PDF + Testing Engine

$40.5  $134.99