ExamGecko
Home / Broadcom / 250-580 / List of questions
Ask Question

Broadcom 250-580 Practice Test - Questions Answers, Page 10

List of questions

Question 91

Report Export Collapse

What are the two (2) locations where an Incident Responder should gather data for an After Actions Report in SEDR? (Select two)

Become a Premium Member for full access
  Unlock Premium Member

Question 92

Report Export Collapse

The Behavioral Heat Map indicates that a specific application and a specific behavior are never used together. What action can be safely set for the application behavior in a Behavioral Isolation policy?

Become a Premium Member for full access
  Unlock Premium Member

Question 93

Report Export Collapse

Which two (2) instances could cause Symantec Endpoint Protection to be unable to remediate a file? (Select two.)

Become a Premium Member for full access
  Unlock Premium Member

Question 94

Report Export Collapse

What SEP feature is leveraged when configuring custom IPS?

Become a Premium Member for full access
  Unlock Premium Member

Question 95

Report Export Collapse

Which action can an administrator take to improve the Symantec Endpoint Protection Manager (SEPM) dashboard performance and report accuracy?

Become a Premium Member for full access
  Unlock Premium Member

Question 96

Report Export Collapse

An administrator is troubleshooting a Symantec Endpoint Protection (SEP) replication.

Which component log should the administrator check to determine whether the communication between the two sites is working correctly?

Become a Premium Member for full access
  Unlock Premium Member

Question 97

Report Export Collapse

In what order should an administrator configure the integration between SEDR and Symantec Endpoint Protection in order to maximize their benefits?

Become a Premium Member for full access
  Unlock Premium Member

Question 98

Report Export Collapse

From which source can an administrator retrieve the SESC Network Integrity agent for a Windows 10 S mode endpoint?

Become a Premium Member for full access
  Unlock Premium Member

Question 99

Report Export Collapse

How does an administrator view all devices impacted by a suspicious file?

Become a Premium Member for full access
  Unlock Premium Member

Question 100

Report Export Collapse

A company deploys Symantec Endpoint Protection (SEP) to 50 virtual machines running on a single ESXi host.

Which configuration change can the administrator make to minimize sudden IOPS impact on the ESXi server while each SEP endpoint communicates with the Symantec Endpoint Protection Manager?

Become a Premium Member for full access
  Unlock Premium Member
Total 150 questions
Go to page: of 15
Search