Broadcom 250-580 Practice Test - Questions Answers, Page 12
List of questions
Question 111

A company allows users to create firewall rules. During the course of business, users are accidentally adding rules that block a custom internal application.
Which steps should the Symantec Endpoint Protection administrator take to prevent users from blocking the custom application?
Question 112

Which term or expression is utilized when adversaries leverage existing tools in the environment?
Question 113

An administrator needs to increase the access speed for client files that are stored on a file server. Which configuration should the administrator review to address the read speed from the server?
Question 114

Which SEP feature is required for using the SEDR Isolate function?
Question 115

What does a medium-priority incident indicate?
Question 116

Which other items may be deleted when deleting a malicious file from an endpoint?
Question 117

An administrator needs to identify infected computers that require a restart to finish remediation of a threat. What steps in the SEPM should an administrator perform to identify and restart the systems?
Question 118

What permissions does the Security Analyst Role have?
Question 119

An organization would like to use a content distribution method that centrally controls content types and versions. Almost all of their endpoints are running Windows.
What type of content distribution method should be used?
Question 120

Which option should an administrator utilize to temporarily or permanently block a file?
Question