ExamGecko
Home / Broadcom / 250-580
Ask Question

250-580: Endpoint Security Complete – R2 Technical Specialist

Vendor:
Exam Questions:
150
 Learners
  2.370
Last Updated
March - 2025
Language
English
4 Quizzes
PDF | VPLUS

Exam Number: 250-580

Exam Name: Endpoint Security Complete – R2 Technical Specialist

Length of test: 180 mins

Exam Format: Multiple-choice questions.

Exam Language: English

Number of questions in the actual exam: 150 questions

Passing Score: 70%

This study guide should help you understand what to expect on the 250-580 exam and includes a summary of the topics the exam might cover and links to additional resources. The information and materials in this document should help you focus your studies as you prepare for the exam.

Related questions

Which option should an administrator utilize to temporarily or permanently block a file?

Become a Premium Member for full access
  Unlock Premium Member

An organization would like to use a content distribution method that centrally controls content types and versions. Almost all of their endpoints are running Windows.

What type of content distribution method should be used?

Become a Premium Member for full access
  Unlock Premium Member

Which SEP feature is required for using the SEDR Isolate function?

Become a Premium Member for full access
  Unlock Premium Member

SES includes an advanced policy versioning system. When an administrator edits and saves the properties of an existing policy, a new version of the policy is created. What is the status of all previous versions of the policy?

Become a Premium Member for full access
  Unlock Premium Member

Which client log shows that a client is downloading content from its designated source?

Risk Log

Risk Log

System Log

System Log

SesmLu.log

SesmLu.log

Log.LiveUpdate

Log.LiveUpdate

Suggested answer: D
Explanation:

The Log.LiveUpdate log shows details related to content downloads on a Symantec Endpoint Protection (SEP) client. This log captures the activities associated with updates, including:

Content Source Information: It records the source from which the client downloads updates, whether from SEPM, a Group Update Provider (GUP), or directly from the LiveUpdate server.

Download Progress and Status: This log helps administrators monitor successful or failed download attempts, along with version details of the downloaded content.

By reviewing the Log.LiveUpdate, administrators can verify if a client is correctly downloading content from its designated source.

asked 13/12/2024
Wojciech Romaldowski
48 questions

Which alert rule category includes events that are generated about the cloud console?

Become a Premium Member for full access
  Unlock Premium Member

An administrator needs to identify infected computers that require a restart to finish remediation of a threat. What steps in the SEPM should an administrator perform to identify and restart the systems?

Become a Premium Member for full access
  Unlock Premium Member

An administrator needs to increase the access speed for client files that are stored on a file server. Which configuration should the administrator review to address the read speed from the server?

Become a Premium Member for full access
  Unlock Premium Member

Which antimalware intensity level is defined by the following: 'Blocks files that are most certainly bad or potentially bad files results in a comparable number of false positives and false negatives.'

Level 6

Level 6

Level 5

Level 5

Level 2

Level 2

Level 1

Level 1

Suggested answer: B
Explanation:

In antimalware solutions, Level 5 intensity is defined as a setting where the software blocks files that are considered either most certainly malicious or potentially malicious. This level aims to balance security with usability by erring on the side of caution; however, it acknowledges that some level of both false positives (legitimate files mistakenly flagged as threats) and false negatives (malicious files mistakenly deemed safe) may still occur.

This level is typically used in environments where security tolerance is high but with an understanding that some legitimate files might occasionally be flagged. It provides robust protection without the extreme strictness of the highest levels, thus reducing, but not eliminating, the possibility of false alerts while maintaining an aggressive security posture.

asked 13/12/2024
Andrey Zhukovskiy
44 questions

When configuring Network Integrity, why is it a requirement to add trusted certificates?

Become a Premium Member for full access
  Unlock Premium Member