ExamGecko
Home / Broadcom / 250-580 / List of questions
Ask Question

Broadcom 250-580 Practice Test - Questions Answers, Page 2

List of questions

Question 11

Report Export Collapse

Which Incident View widget shows the parent-child relationship of related security events?

The Incident Summary Widget

The Incident Summary Widget

The Process Lineage Widget

The Process Lineage Widget

The Events Widget

The Events Widget

The Incident Graph Widget

The Incident Graph Widget

Suggested answer: B
Explanation:

The Process Lineage Widget in the Incident View of Symantec Endpoint Security provides a visual representation of the parent-child relationship among related security events, such as processes or activities stemming from a primary malicious action. This widget is valuable for tracing the origins and propagation paths of potential threats within a system, allowing security teams to identify the initial process that triggered subsequent actions. By displaying this hierarchical relationship, the Process Lineage Widget supports in-depth forensic analysis, helping administrators understand how an incident unfolded and assess the impact of each related security event in context.

asked 13/12/2024
Aaaa ddsdss
26 questions

Question 12

Report Export Collapse

Which Symantec Endpoint Protection technology blocks a downloaded program from installing browser plugins?

Intrusion Prevention

Intrusion Prevention

SONAR

SONAR

Application and Device Control

Application and Device Control

Tamper Protection

Tamper Protection

Suggested answer: C
Explanation:

The Application and Device Control technology within Symantec Endpoint Protection (SEP) is responsible for blocking unauthorized software behaviors, such as preventing a downloaded program from installing browser plugins. This feature is designed to enforce policies that restrict specific actions by applications, which includes controlling program installation behaviors, access to certain system components, and interactions with browser settings. Application and Device Control effectively safeguards endpoints by stopping potentially unwanted or malicious modifications to the browser, thus protecting users from threats that may arise from unverified or harmful plugins.

asked 13/12/2024
Robert Fox
56 questions

Question 13

Report Export Collapse

Which type of event does operation:1 indicate in a SEDR database search?

File Deleted.

File Deleted.

File Closed.

File Closed.

File Open.

File Open.

File Created.

File Created.

Suggested answer: C
Explanation:

In a Symantec Endpoint Detection and Response (SEDR) database search, an event labeled with operation:1 corresponds to a File Open action. This identifier is part of SEDR's internal operation codes used to log file interactions. When querying or analyzing events in the SEDR database, recognizing this code helps Incident Responders understand that the action recorded was an attempt to access or open a file on the endpoint, which may be relevant in tracking suspicious or malicious activities.

asked 13/12/2024
Babatunde Ipaye
48 questions

Question 14

Report Export Collapse

An Incident Responder has determined that an endpoint is compromised by a malicious threat. What SEDR feature would be utilized first to contain the threat?

File Deletion

File Deletion

Incident Manager

Incident Manager

Isolation

Isolation

Endpoint Activity Recorder

Endpoint Activity Recorder

Suggested answer: C
Explanation:

When an Incident Responder determines that an endpoint is compromised, the first action to contain the threat is to use the Isolation feature in Symantec Endpoint Detection and Response (SEDR). Isolation effectively disconnects the affected endpoint from the network, thereby preventing the malicious threat from communicating with other systems or spreading within the network environment. This feature enables the responder to contain the threat swiftly, allowing further investigation and remediation steps to be conducted without risk of lateral movement by the attacker.

asked 13/12/2024
Frank van Hout
46 questions

Question 15

Report Export Collapse

If an administrator enables the setting to manage policies from the cloud, what steps must be taken to reverse this process?

Navigate to ICDm > Enrollment and disable the setting

Navigate to ICDm > Enrollment and disable the setting

Unenroll the SEPM > Disable the setting > Re-enroll the SEPM

Unenroll the SEPM > Disable the setting > Re-enroll the SEPM

Revoke policies from ICDm

Revoke policies from ICDm

Revoke policies from SEPM

Revoke policies from SEPM

Suggested answer: B
Explanation:

If an administrator has enabled the setting to manage policies from the cloud and needs to reverse this, they must follow these steps:

Unenroll the SEPM (Symantec Endpoint Protection Manager) from the cloud management (ICDm).

Disable the cloud policy management setting within the SEPM.

Re-enroll the SEPM back into the cloud if required.

This process ensures that policy control is reverted from cloud management to local management on the SEPM. By following these steps, administrators restore full local control over policies, disabling any cloud-based management settings previously in effect.

asked 13/12/2024
sheldan simeina
40 questions

Question 16

Report Export Collapse

How would an administrator specify which remote consoles and servers have access to the management server?

Edit the Server Properties and under the General tab, change the Server Communication Permission.

Edit the Server Properties and under the General tab, change the Server Communication Permission.

Edit the Communication Settings for the Group under the Clients tab.

Edit the Communication Settings for the Group under the Clients tab.

Edit the External Communication Settings for the Group under the Clients tab.

Edit the External Communication Settings for the Group under the Clients tab.

Edit the Site Properties and under the General tab, change the server priority.

Edit the Site Properties and under the General tab, change the server priority.

Suggested answer: A
Explanation:

To control which remote consoles and servers have access to the Symantec Endpoint Protection Management (SEPM) server, an administrator should edit the Server Properties and adjust the Server Communication Permission under the General tab. This setting specifies which remote systems are authorized to communicate with the management server, enhancing security by limiting access to trusted consoles and servers only. Adjusting the Server Communication Permission helps manage server access centrally and ensures only approved systems interact with the management server.

asked 13/12/2024
asd asd
36 questions

Question 17

Report Export Collapse

Which designation should an administrator assign to the computer configured to find unmanaged devices?

Discovery Device

Discovery Device

Discovery Manager

Discovery Manager

Discovery Agent

Discovery Agent

Discovery Broker

Discovery Broker

Suggested answer: C
Explanation:

In Symantec Endpoint Protection, the Discovery Agent designation is assigned to a computer responsible for identifying unmanaged devices within a network. This role is crucial for discovering endpoints that lack protection or are unmanaged, allowing the administrator to deploy agents or take appropriate action. Configuring a Discovery Agent facilitates continuous monitoring and helps ensure that all devices on the network are recognized and managed.

asked 13/12/2024
Andrea Chichiarelli
43 questions

Question 18

Report Export Collapse

An administrator notices that some entries list that the Risk was partially removed. The administrator needs to determine whether additional steps are necessary to remediate the threat.

Where in the Symantec Endpoint Protection Manager console can the administrator find additional information on the risk?

Risk log

Risk log

Computer Status report

Computer Status report

Notifications

Notifications

Infected and At-Risk Computers report

Infected and At-Risk Computers report

Suggested answer: A
Explanation:

To gather more details about threats that were only partially removed, an administrator should consult the Risk log in the Symantec Endpoint Protection Manager (SEPM) console. The Risk log provides comprehensive information about detected threats, their removal status, and any remediation actions taken. By examining these logs, the administrator can determine if additional steps are required to fully mitigate the threat, ensuring that the endpoint is entirely secure and free of residual risks.

asked 13/12/2024
Bart Sandifort
38 questions

Question 19

Report Export Collapse

Which Endpoint Setting should an administrator utilize to locate unmanaged endpoints on a network subnet?

Device Discovery

Device Discovery

Endpoint Enrollment

Endpoint Enrollment

Discover and Deploy

Discover and Deploy

Discover Endpoints

Discover Endpoints

Suggested answer: C
Explanation:

To locate unmanaged endpoints within a specific network subnet, an administrator should utilize the Discover and Deploy setting. This feature scans the network for endpoints without security management, enabling administrators to identify and initiate the deployment of Symantec Endpoint Protection agents on unmanaged devices. This proactive approach ensures comprehensive coverage across the network, allowing for efficient detection and management of all endpoints within the organization.

asked 13/12/2024
annalise ramdin
41 questions

Question 20

Report Export Collapse

Why is it important for an Incident Responder to copy malicious files to the SEDR file store or create an image of the infected system during the Recovery phase?

To create custom IPS signatures

To create custom IPS signatures

To test the effectiveness of the current assigned policy settings in the Symantec Endpoint Protection Manager (SEPM)

To test the effectiveness of the current assigned policy settings in the Symantec Endpoint Protection Manager (SEPM)

To have a copy of the file for policy enforcement

To have a copy of the file for policy enforcement

To document and preserve any pieces of evidence associated with the incident

To document and preserve any pieces of evidence associated with the incident

Suggested answer: D
Explanation:

During the Recovery phase of an incident response, it is critical for an Incident Responder to copy malicious files to the SEDR file store or create an image of the infected system. This action preserves evidence associated with the incident, allowing for thorough investigation and analysis. By securing a copy of the malicious files or system state, responders maintain a record of the incident that can be analyzed for root cause assessment, used for potential legal proceedings, or retained for post-incident review. Documenting and preserving evidence ensures that key information is available for future reference or audits.

asked 13/12/2024
Saysha Vargas
35 questions
Total 150 questions
Go to page: of 15