Broadcom 250-580 Practice Test - Questions Answers, Page 2
List of questions
Question 11

Which Incident View widget shows the parent-child relationship of related security events?
The Incident Summary Widget
The Process Lineage Widget
The Events Widget
The Incident Graph Widget
The Process Lineage Widget in the Incident View of Symantec Endpoint Security provides a visual representation of the parent-child relationship among related security events, such as processes or activities stemming from a primary malicious action. This widget is valuable for tracing the origins and propagation paths of potential threats within a system, allowing security teams to identify the initial process that triggered subsequent actions. By displaying this hierarchical relationship, the Process Lineage Widget supports in-depth forensic analysis, helping administrators understand how an incident unfolded and assess the impact of each related security event in context.
Question 12

Which Symantec Endpoint Protection technology blocks a downloaded program from installing browser plugins?
Intrusion Prevention
SONAR
Application and Device Control
Tamper Protection
The Application and Device Control technology within Symantec Endpoint Protection (SEP) is responsible for blocking unauthorized software behaviors, such as preventing a downloaded program from installing browser plugins. This feature is designed to enforce policies that restrict specific actions by applications, which includes controlling program installation behaviors, access to certain system components, and interactions with browser settings. Application and Device Control effectively safeguards endpoints by stopping potentially unwanted or malicious modifications to the browser, thus protecting users from threats that may arise from unverified or harmful plugins.
Question 13

Which type of event does operation:1 indicate in a SEDR database search?
File Deleted.
File Closed.
File Open.
File Created.
In a Symantec Endpoint Detection and Response (SEDR) database search, an event labeled with operation:1 corresponds to a File Open action. This identifier is part of SEDR's internal operation codes used to log file interactions. When querying or analyzing events in the SEDR database, recognizing this code helps Incident Responders understand that the action recorded was an attempt to access or open a file on the endpoint, which may be relevant in tracking suspicious or malicious activities.
Question 14

An Incident Responder has determined that an endpoint is compromised by a malicious threat. What SEDR feature would be utilized first to contain the threat?
File Deletion
Incident Manager
Isolation
Endpoint Activity Recorder
When an Incident Responder determines that an endpoint is compromised, the first action to contain the threat is to use the Isolation feature in Symantec Endpoint Detection and Response (SEDR). Isolation effectively disconnects the affected endpoint from the network, thereby preventing the malicious threat from communicating with other systems or spreading within the network environment. This feature enables the responder to contain the threat swiftly, allowing further investigation and remediation steps to be conducted without risk of lateral movement by the attacker.
Question 15

If an administrator enables the setting to manage policies from the cloud, what steps must be taken to reverse this process?
Navigate to ICDm > Enrollment and disable the setting
Unenroll the SEPM > Disable the setting > Re-enroll the SEPM
Revoke policies from ICDm
Revoke policies from SEPM
If an administrator has enabled the setting to manage policies from the cloud and needs to reverse this, they must follow these steps:
Unenroll the SEPM (Symantec Endpoint Protection Manager) from the cloud management (ICDm).
Disable the cloud policy management setting within the SEPM.
Re-enroll the SEPM back into the cloud if required.
This process ensures that policy control is reverted from cloud management to local management on the SEPM. By following these steps, administrators restore full local control over policies, disabling any cloud-based management settings previously in effect.
Question 16

How would an administrator specify which remote consoles and servers have access to the management server?
Edit the Server Properties and under the General tab, change the Server Communication Permission.
Edit the Communication Settings for the Group under the Clients tab.
Edit the External Communication Settings for the Group under the Clients tab.
Edit the Site Properties and under the General tab, change the server priority.
To control which remote consoles and servers have access to the Symantec Endpoint Protection Management (SEPM) server, an administrator should edit the Server Properties and adjust the Server Communication Permission under the General tab. This setting specifies which remote systems are authorized to communicate with the management server, enhancing security by limiting access to trusted consoles and servers only. Adjusting the Server Communication Permission helps manage server access centrally and ensures only approved systems interact with the management server.
Question 17

Which designation should an administrator assign to the computer configured to find unmanaged devices?
Discovery Device
Discovery Manager
Discovery Agent
Discovery Broker
In Symantec Endpoint Protection, the Discovery Agent designation is assigned to a computer responsible for identifying unmanaged devices within a network. This role is crucial for discovering endpoints that lack protection or are unmanaged, allowing the administrator to deploy agents or take appropriate action. Configuring a Discovery Agent facilitates continuous monitoring and helps ensure that all devices on the network are recognized and managed.
Question 18

An administrator notices that some entries list that the Risk was partially removed. The administrator needs to determine whether additional steps are necessary to remediate the threat.
Where in the Symantec Endpoint Protection Manager console can the administrator find additional information on the risk?
Risk log
Computer Status report
Notifications
Infected and At-Risk Computers report
To gather more details about threats that were only partially removed, an administrator should consult the Risk log in the Symantec Endpoint Protection Manager (SEPM) console. The Risk log provides comprehensive information about detected threats, their removal status, and any remediation actions taken. By examining these logs, the administrator can determine if additional steps are required to fully mitigate the threat, ensuring that the endpoint is entirely secure and free of residual risks.
Question 19

Which Endpoint Setting should an administrator utilize to locate unmanaged endpoints on a network subnet?
Device Discovery
Endpoint Enrollment
Discover and Deploy
Discover Endpoints
To locate unmanaged endpoints within a specific network subnet, an administrator should utilize the Discover and Deploy setting. This feature scans the network for endpoints without security management, enabling administrators to identify and initiate the deployment of Symantec Endpoint Protection agents on unmanaged devices. This proactive approach ensures comprehensive coverage across the network, allowing for efficient detection and management of all endpoints within the organization.
Question 20

Why is it important for an Incident Responder to copy malicious files to the SEDR file store or create an image of the infected system during the Recovery phase?
To create custom IPS signatures
To test the effectiveness of the current assigned policy settings in the Symantec Endpoint Protection Manager (SEPM)
To have a copy of the file for policy enforcement
To document and preserve any pieces of evidence associated with the incident
During the Recovery phase of an incident response, it is critical for an Incident Responder to copy malicious files to the SEDR file store or create an image of the infected system. This action preserves evidence associated with the incident, allowing for thorough investigation and analysis. By securing a copy of the malicious files or system state, responders maintain a record of the incident that can be analyzed for root cause assessment, used for potential legal proceedings, or retained for post-incident review. Documenting and preserving evidence ensures that key information is available for future reference or audits.
Question