Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

Newly Released Symantec 250-580 Exam PDF

Page: 8 / 11
Question 32

Which Endpoint Setting should an administrator utilize to locate unmanaged endpoints on a network subnet?

Options:

A.

Device Discovery

B.

Endpoint Enrollment

C.

Discover and Deploy

D.

Discover Endpoints

Question 33

What EDR feature provides endpoint activity recorder data for a file hash?

Options:

A.

Process Dump

B.

Entity Dump

C.

Hash Dump

D.

Full Dump

Question 34

What does a medium-priority incident indicate?

Options:

A.

The incident may have an impact on the business

B.

The incident can result in a business outage

C.

The incident does not affect critical business operation

D.

The incident can safely be ignored

Question 35

What is the purpose of a Threat Defense for Active Directory Deceptive Account?

Options:

A.

It prevents attackers from reading the contents of the Domain Admins Group.

B.

It assigns a fake NTLM password hash value for users with an assigned AdminCount attribute.

C.

It exposes attackers as they seek to gather credential information from workstation memory.

D.

It acts as a honeypot to expose attackers as they attempt to build their AD treasure map

Page: 8 / 11
Exam Code: 250-580
Exam Name: Endpoint Security Complete - R2 Technical Specialist
Last Update: Nov 24, 2024
Questions: 150
250-580 pdf

250-580 PDF

$25.5  $84.99
250-580 Engine

250-580 Testing Engine

$28.5  $94.99
250-580 PDF + Engine

250-580 PDF + Testing Engine

$40.5  $134.99