Broadcom 250-580 Practice Test - Questions Answers, Page 14
List of questions
Question 131

What type of condition must be included in a custom incident rule in order for it to be valid?
Question 132

Which EDR feature is used to search for real-time indicators of compromise?
Question 133

Administrators at a company share a single terminal for configuring Symantec Endpoint Protection. The administrators want to ensure that each administrator using the console is forced to authenticate using their individual credentials. They are concerned that administrators may forget to log off the terminal, which would easily allow others to gain access to the Symantec Endpoint Protection Manager (SEPM) console.
Which setting should the administrator disable to minimize the risk of non-authorized users logging into the SEPM console?
Question 134

Which type of security threat is used by attackers to exploit vulnerable applications?
Question 135

What happens when a device fails a Host Integrity check?
Question 136

A user is unknowingly about to connect to a malicious website and download a known threat within a .rar file. All Symantec Endpoint Protection technologies are installed on the client's system.
In which feature set order must the threat pass through to successfully infect the system?
Question 137

Which ICDm role is required in order to use LiveShell?
Question 138

What methods should an administrator utilize to restore communication on a client running SEP for Mac?
Question 139

An organization has a virtualized environment that is utilized by a group of Developers for testing. What feature can this organization utilize to optimize performance when running scheduled scans?
Question 140

Which security control is complementary to IPS, providing a second layer of protection against network attacks?
Question