ExamGecko
Home / Broadcom / 250-580 / List of questions
Ask Question

Broadcom 250-580 Practice Test - Questions Answers, Page 14

List of questions

Question 131

Report Export Collapse

What type of condition must be included in a custom incident rule in order for it to be valid?

Become a Premium Member for full access
  Unlock Premium Member

Question 132

Report Export Collapse

Which EDR feature is used to search for real-time indicators of compromise?

Become a Premium Member for full access
  Unlock Premium Member

Question 133

Report Export Collapse

Administrators at a company share a single terminal for configuring Symantec Endpoint Protection. The administrators want to ensure that each administrator using the console is forced to authenticate using their individual credentials. They are concerned that administrators may forget to log off the terminal, which would easily allow others to gain access to the Symantec Endpoint Protection Manager (SEPM) console.

Which setting should the administrator disable to minimize the risk of non-authorized users logging into the SEPM console?

Become a Premium Member for full access
  Unlock Premium Member

Question 134

Report Export Collapse

Which type of security threat is used by attackers to exploit vulnerable applications?

Become a Premium Member for full access
  Unlock Premium Member

Question 135

Report Export Collapse

What happens when a device fails a Host Integrity check?

Become a Premium Member for full access
  Unlock Premium Member

Question 136

Report Export Collapse

A user is unknowingly about to connect to a malicious website and download a known threat within a .rar file. All Symantec Endpoint Protection technologies are installed on the client's system.

In which feature set order must the threat pass through to successfully infect the system?

Become a Premium Member for full access
  Unlock Premium Member

Question 137

Report Export Collapse

Which ICDm role is required in order to use LiveShell?

Become a Premium Member for full access
  Unlock Premium Member

Question 138

Report Export Collapse

What methods should an administrator utilize to restore communication on a client running SEP for Mac?

Become a Premium Member for full access
  Unlock Premium Member

Question 139

Report Export Collapse

An organization has a virtualized environment that is utilized by a group of Developers for testing. What feature can this organization utilize to optimize performance when running scheduled scans?

Become a Premium Member for full access
  Unlock Premium Member

Question 140

Report Export Collapse

Which security control is complementary to IPS, providing a second layer of protection against network attacks?

Become a Premium Member for full access
  Unlock Premium Member
Total 150 questions
Go to page: of 15