ExamGecko
Home / Broadcom / 250-580 / List of questions
Ask Question

Broadcom 250-580 Practice Test - Questions Answers

Add to Whishlist

List of questions

Question 1

Report Export Collapse

A Symantec Endpoint Protection (SEP) administrator receives multiple reports that machines are experiencing performance issues. The administrator discovers that the reports happen at about the same time as the scheduled LiveUpdate.

Which setting should the SEP administrator configure to minimize I/O when LiveUpdate occurs?

Change the LiveUpdate schedule

Change the LiveUpdate schedule

Change the Administrator-defined scan schedule

Change the Administrator-defined scan schedule

Disable Allow user-defined scans to run when the scan author is logged off

Disable Allow user-defined scans to run when the scan author is logged off

Disable Run an Active Scan when new definitions arrive

Disable Run an Active Scan when new definitions arrive

Suggested answer: A
Explanation:

To minimize I/O impact when LiveUpdate occurs, the LiveUpdate schedule should be adjusted. Here's why this solution is effective:

Reduced System Impact During Peak Hours: By scheduling LiveUpdate during off-peak times, system resources are freed up during high-usage periods, reducing the likelihood of performance issues.

Efficient Resource Allocation: Adjusting the schedule allows LiveUpdate to run at times when endpoint resources are less likely to be needed for user activities, minimizing its impact on performance.

Maintaining Regular Updates: This approach ensures that updates still occur regularly without impacting endpoint performance during work hours.

This method is optimal for managing resource load and maintaining smooth performance during scheduled updates.

asked 13/12/2024
Simon Merlin AGHOKENG
49 questions

Question 2

Report Export Collapse

Which two (2) security controls are utilized by an administrator to mitigate threats associated with the Discovery phase? (Select two)

Firewall

Firewall

IPS

IPS

Antimalware

Antimalware

Blacklist

Blacklist

Device Control

Device Control

Suggested answer: A, B
Explanation:

In the Discovery phase of a cyber attack, attackers attempt to map the network, identify vulnerabilities, and gather information. Firewall and Intrusion Prevention System (IPS) are the most effective security controls to mitigate threats associated with this phase:

Firewall: The firewall restricts unauthorized network access, blocking suspicious or unexpected traffic that could be part of reconnaissance efforts.

IPS: Intrusion Prevention Systems detect and prevent suspicious traffic patterns that might indicate scanning or probing activity, which are common in the Discovery phase.

Together, these controls limit attackers' ability to explore the network and identify potential vulnerabilities.

asked 13/12/2024
Alice Smith
48 questions

Question 3

Report Export Collapse

Which rule types should be at the bottom of the list when an administrator adds device control rules?

Specific 'device type' rules

Specific 'device type' rules

Specific 'device model' rules

Specific 'device model' rules

General 'catch all' rules

General 'catch all' rules

General 'brand defined' rules

General 'brand defined' rules

Suggested answer: C
Explanation:

When adding device control rules, General 'catch all' rules should be placed at the bottom of the rule list. This approach ensures that:

Specificity Precedes Generality: Specific rules (like those for device type or model) are applied first, allowing fine-grained control over device access.

Efficient Rule Processing: Placing general rules last prevents them from inadvertently overriding more specific rules, which could lead to unintended access restrictions or allowances.

This ordering helps maintain effective and targeted control over devices, while still providing a fallback catch-all rule to manage unspecified devices.

asked 13/12/2024
Anupam Roy
54 questions

Question 4

Report Export Collapse

An administrator decides to migrate an SES Complete hybrid environment to a fully cloud-managed one. After cleaning up on-premise group structure and policies. What is the next recommended step for migration?

Export unique policies from SEPM

Export unique policies from SEPM

Enroll the SEPM in ICDm

Enroll the SEPM in ICDm

Migrate the agents from ICDm D Import unique policies in ICDm

Migrate the agents from ICDm D Import unique policies in ICDm

Suggested answer: A
Explanation:

When migrating an SES Complete hybrid environment to a fully cloud-managed setup, the next recommended step after cleaning up the on-premises group structure and policies is to export unique policies from SEPM. This ensures:

Policy Continuity: Exporting policies from SEPM preserves any unique configurations that need to be replicated or adapted in the cloud environment.

Preparation for Import to ICDm: These exported policies can then be imported into ICDm, facilitating a smoother transition without losing specific policy customizations.

This step is crucial for maintaining consistent security policy enforcement as the environment transitions to cloud management.

asked 13/12/2024
Trevor O'Brien
43 questions

Question 5

Report Export Collapse

Which client log shows that a client is downloading content from its designated source?

Risk Log

Risk Log

System Log

System Log

SesmLu.log

SesmLu.log

Log.LiveUpdate

Log.LiveUpdate

Suggested answer: D
Explanation:

The Log.LiveUpdate log shows details related to content downloads on a Symantec Endpoint Protection (SEP) client. This log captures the activities associated with updates, including:

Content Source Information: It records the source from which the client downloads updates, whether from SEPM, a Group Update Provider (GUP), or directly from the LiveUpdate server.

Download Progress and Status: This log helps administrators monitor successful or failed download attempts, along with version details of the downloaded content.

By reviewing the Log.LiveUpdate, administrators can verify if a client is correctly downloading content from its designated source.

asked 13/12/2024
Wojciech Romaldowski
49 questions

Question 6

Report Export Collapse

What EDR function minimizes the risk of an endpoint infecting other resources in the environment?

Quarantine

Quarantine

Block

Block

Deny List

Deny List

Firewall

Firewall

Suggested answer: A
Explanation:

The function of 'Quarantine' in Endpoint Detection and Response (EDR) minimizes the risk of an infected endpoint spreading malware or malicious activities to other systems within the network environment. This is accomplished by isolating or restricting access of the infected endpoint to contain any threat within that specific machine. Here's how Quarantine functions as a protective measure:

Detection and Isolation: When EDR detects potential malicious behavior or files on an endpoint, it can automatically place the infected file or process in a 'quarantine' area. This means the threat is separated from the rest of the system, restricting its ability to execute or interact with other resources.

Minimizing Spread: By isolating compromised files or applications, Quarantine ensures that malware or suspicious activities do not propagate to other endpoints, reducing the risk of a widespread infection.

Administrative Review: After an item is quarantined, administrators can review it to determine if it should be deleted or restored based on a false positive evaluation. This controlled environment allows for further analysis without risking network security.

Endpoint-Specific Control: Quarantine is designed to act at the endpoint level, applying restrictions that affect only the infected system without disrupting other network resources.

Using Quarantine as an EDR response mechanism aligns with best practices outlined in endpoint security documentation, such as Symantec Endpoint Protection, which emphasizes containment as a critical first response to threats. This approach supports the proactive defense strategy of limiting lateral movement of malware across a network, thus preserving the security and stability of the entire system.

asked 13/12/2024
Rebekah Midkiff
43 questions

Question 7

Report Export Collapse

What priority would an incident that may have an impact on business be considered?

Low

Low

Critical

Critical

High

High

Medium

Medium

Suggested answer: C
Explanation:

An incident that may have an impact on business is typically classified with a High priority in cybersecurity frameworks and incident response protocols. Here's a detailed rationale for this classification:

Potential Business Disruption: An incident that affects or threatens to affect business operations, even if indirectly, is assigned a high priority to ensure swift response. This classification prioritizes incidents that may not be immediately critical but could escalate if not addressed promptly.

Risk of Escalation: High-priority incidents are situations that, while not catastrophic, have the potential to impact critical systems or compromise sensitive data, thus needing attention before they lead to severe business repercussions.

Rapid Response Requirement: Incidents labeled as high priority are flagged for immediate investigation and containment measures to prevent further business impact or operational downtime.

In this context, while Critical incidents involve urgent threats with immediate, severe effects (such as active data breaches), a High priority applies to incidents with significant risk or potential for business impact. This prioritization is essential for effective incident management, enabling resources to focus on potential risks to business continuity.

asked 13/12/2024
Zulkarnain Hashim
44 questions

Question 8

Report Export Collapse

Which antimalware intensity level is defined by the following: 'Blocks files that are most certainly bad or potentially bad files results in a comparable number of false positives and false negatives.'

Level 6

Level 6

Level 5

Level 5

Level 2

Level 2

Level 1

Level 1

Suggested answer: B
Explanation:

In antimalware solutions, Level 5 intensity is defined as a setting where the software blocks files that are considered either most certainly malicious or potentially malicious. This level aims to balance security with usability by erring on the side of caution; however, it acknowledges that some level of both false positives (legitimate files mistakenly flagged as threats) and false negatives (malicious files mistakenly deemed safe) may still occur.

This level is typically used in environments where security tolerance is high but with an understanding that some legitimate files might occasionally be flagged. It provides robust protection without the extreme strictness of the highest levels, thus reducing, but not eliminating, the possibility of false alerts while maintaining an aggressive security posture.

asked 13/12/2024
Andrey Zhukovskiy
45 questions

Question 9

Report Export Collapse

The SES Intrusion Prevention System has blocked an intruder's attempt to establish an IRC connection inside the firewall. Which Advanced Firewall Protection setting should an administrator enable to prevent the intruder's system from communicating with the network after the IPS detection?

Enable port scan detection

Enable port scan detection

Automatically block an attacker's IP address

Automatically block an attacker's IP address

Block all traffic until the firewall starts and after the firewall stops

Block all traffic until the firewall starts and after the firewall stops

Enable denial of service detection

Enable denial of service detection

Suggested answer: B
Explanation:

To enhance security and prevent further attempts from the intruder after the Intrusion Prevention System (IPS) has detected and blocked an attack, the administrator should enable the setting to Automatically block an attacker's IP address. Here's why this setting is critical:

Immediate Action Against Threats: By automatically blocking the IP address of the detected attacker, the firewall can prevent any further communication attempts from that address. This helps to mitigate the risk of subsequent attacks or reconnections.

Proactive Defense Mechanism: Enabling this feature serves as a proactive defense strategy, minimizing the chances of successful future intrusions by making it harder for the attacker to re-establish a connection to the network.

Reduction of Administrative Overhead: Automating this response allows the security team to focus on investigating and remediating the incident rather than manually tracking and blocking malicious IP addresses, thus optimizing incident response workflows.

Layered Security Approach: This setting complements other security measures, such as intrusion detection and port scan detection, creating a layered security approach that enhances overall network security.

Enabling automatic blocking of an attacker's IP address directly addresses the immediate risk posed by the detected intrusion and reinforces the organization's defense posture against future threats.

asked 13/12/2024
Luis Maciel
49 questions

Question 10

Report Export Collapse

After several failed logon attempts, the Symantec Endpoint Protection Manager (SEPM) has locked the default admin account. An administrator needs to make system changes as soon as possible to address an outbreak, but the admin account is the only account.

Which action should the administrator take to correct the problem with minimal impact on the existing environment?

Wait 15 minutes and attempt to log on again

Wait 15 minutes and attempt to log on again

Restore the SEPM from a backup

Restore the SEPM from a backup

Run the Management Server and Configuration Wizard to reconfigure the server

Run the Management Server and Configuration Wizard to reconfigure the server

Reinstall the SEPM

Reinstall the SEPM

Suggested answer: A
Explanation:

In the situation where the default admin account of the Symantec Endpoint Protection Manager (SEPM) is locked after several failed login attempts, the best course of action for the administrator is to wait 15 minutes and attempt to log on again. Here's why this approach is advisable:

Account Lockout Policy: Most systems, including SEPM, are designed with account lockout policies that temporarily disable accounts after a number of failed login attempts. Typically, these policies include a reset time (often around 15 minutes), after which the account becomes active again.

Minimal Disruption: Waiting for the account to automatically unlock minimizes disruption to the existing environment. This avoids potentially complex recovery processes or the need to restore from a backup, which could introduce additional complications or data loss.

Avoiding System Changes: Taking actions such as restoring the SEPM from a backup, reconfiguring the server, or reinstalling could lead to significant changes in the configuration and might cause further complications, especially if immediate action is needed to address an outbreak.

Prioritizing Response to Threats: While it's important to respond to security incidents quickly, maintaining the integrity of the SEPM configuration and ensuring a smooth recovery is also crucial. Waiting for the lockout period respects the system's security protocols and allows the administrator to regain access with minimal risk.

In summary, waiting for the lockout to expire is the most straightforward and least disruptive solution, allowing the administrator to resume critical functions without unnecessary risk to the SEPM environment.

asked 13/12/2024
Tyler Henderson
40 questions
Total 150 questions
Go to page: of 15
Search