Broadcom 250-580 Practice Test - Questions Answers, Page 12
List of questions
Question 111
A company allows users to create firewall rules. During the course of business, users are accidentally adding rules that block a custom internal application.
Which steps should the Symantec Endpoint Protection administrator take to prevent users from blocking the custom application?
Question 112
Which term or expression is utilized when adversaries leverage existing tools in the environment?
Question 113
An administrator needs to increase the access speed for client files that are stored on a file server. Which configuration should the administrator review to address the read speed from the server?
Question 114
Which SEP feature is required for using the SEDR Isolate function?
Question 115
What does a medium-priority incident indicate?
Question 116
Which other items may be deleted when deleting a malicious file from an endpoint?
Question 117
An administrator needs to identify infected computers that require a restart to finish remediation of a threat. What steps in the SEPM should an administrator perform to identify and restart the systems?
Question 118
What permissions does the Security Analyst Role have?
Question 119
An organization would like to use a content distribution method that centrally controls content types and versions. Almost all of their endpoints are running Windows.
What type of content distribution method should be used?
Question 120
Which option should an administrator utilize to temporarily or permanently block a file?
Question