ExamGecko
Home / Broadcom / 250-580 / List of questions
Ask Question

Broadcom 250-580 Practice Test - Questions Answers, Page 3

Add to Whishlist

List of questions

Question 21

Report Export Collapse

An administrator changes the Virus and Spyware Protection policy for a specific group that disables Auto-Protect. The administrator assigns the policy and the client systems apply the corresponding policy serial number. Upon visual inspection of a physical client system, the policy serial number is correct. However, Auto-Protect is still enabled on the client system.

Which action should the administrator take to ensure that the desired setting is in place for the client?

Restart the client system

Restart the client system

Run a command on the computer to Update Content

Run a command on the computer to Update Content

Enable the padlock next to the setting in the policy

Enable the padlock next to the setting in the policy

Withdraw the Virus and Spyware Protection policy

Withdraw the Virus and Spyware Protection policy

Suggested answer: C
Explanation:

If an administrator modifies the Virus and Spyware Protection policy to disable Auto-Protect, but finds it still enabled on the client, the likely cause is that the setting was not locked. In Symantec Endpoint Protection policies, enabling the padlock icon next to a setting ensures that the policy is enforced strictly, overriding local client configurations. Without this lock, clients may retain previous settings despite the new policy. Locking the setting guarantees that the desired configuration is applied consistently across all clients within the specified group.

asked 13/12/2024
Veronica Puddu
57 questions

Question 22

Report Export Collapse

In the virus and Spyware Protection policy, an administrator sets the First action to Clean risk and sets If first action fails to Delete risk. Which two (2) factors should the administrator consider? (Select two.)

The deleted file may still be in the Recycle Bin.

The deleted file may still be in the Recycle Bin.

IT Analytics may keep a copy of the file for investigation.

IT Analytics may keep a copy of the file for investigation.

False positives may delete legitimate files.

False positives may delete legitimate files.

Insight may back up the file before sending it to Symantec.

Insight may back up the file before sending it to Symantec.

A copy of the threat may still be in the quarantine.

A copy of the threat may still be in the quarantine.

Suggested answer: C, E
Explanation:

When configuring a Virus and Spyware Protection policy with the actions to 'Clean risk' first and 'Delete risk' if cleaning fails, two important considerations are:

False Positives (C): There is a risk that legitimate files may be falsely identified as threats and deleted if the cleaning action fails. This outcome underscores the importance of careful policy configuration to avoid loss of important files.

Quarantine Copy (E): Even if a file is deleted, a copy might still remain in the quarantine. This backup allows for retrieval if the deletion was a false positive or if further analysis of the file is required for investigation purposes.

These considerations help administrators avoid unintended data loss and maintain flexibility for future review of quarantined threats.

asked 13/12/2024
Maurice Nicholson
53 questions

Question 23

Report Export Collapse

What protection technology should an administrator enable to prevent double executable file names of ransomware variants like Cryptolocker from running?

Download Insight

Download Insight

Intrusion Prevention System

Intrusion Prevention System

SONAR

SONAR

Memory Exploit Mitigation

Memory Exploit Mitigation

Suggested answer: C
Explanation:

To prevent ransomware variants, such as Cryptolocker, from executing with double executable file names, an administrator should enable SONAR (Symantec Online Network for Advanced Response). SONAR detects and blocks suspicious behaviors based on file characteristics and real-time monitoring, which is effective in identifying malicious patterns associated with ransomware. By analyzing unusual behaviors, such as double executable file names, SONAR provides proactive protection against ransomware threats before they can cause harm to the system.

asked 13/12/2024
Nicoleta Moglan
40 questions

Question 24

Report Export Collapse

Which Indicator of Compromise might be detected as variations in the behavior of privileged users that indicate that their account is being used by someone else to gain a foothold in an environment?

Mismatched Port - Application Traffic

Mismatched Port - Application Traffic

Irregularities in Privileged User Account Activity

Irregularities in Privileged User Account Activity

Surges in Database Read Volume

Surges in Database Read Volume

Geographical Irregularities

Geographical Irregularities

Suggested answer: B
Explanation:

An Indicator of Compromise (IOC), such as irregularities in privileged user account activity, can signal that a privileged account may be compromised and used maliciously. This can involve deviations from typical login times, unusual commands or requests, or access to resources not typically utilized by the user. Monitoring such anomalies can help detect when an attacker has gained access to a privileged account and is attempting to establish control within the environment.

asked 13/12/2024
Sunila Chugh
42 questions

Question 25

Report Export Collapse

Why is Active Directory a part of nearly every targeted attack?

AD administration is managed by weak legacy APIs.

AD administration is managed by weak legacy APIs.

AD is, by design, an easily accessed flat file name space directory database

AD is, by design, an easily accessed flat file name space directory database

AD exposes all of its identities, applications, and resources to every endpoint in the network

AD exposes all of its identities, applications, and resources to every endpoint in the network

AD user attribution includes hidden elevated admin privileges

AD user attribution includes hidden elevated admin privileges

Suggested answer: C
Explanation:

Active Directory (AD) is commonly targeted in attacks because it serves as a central directory for user identities, applications, and resources accessible across the network. This visibility makes it an attractive target for attackers to exploit for lateral movement, privilege escalation, and reconnaissance. Once compromised, AD provides attackers with significant insight into an organization's internal structure, enabling further exploitation and access to sensitive data.

asked 13/12/2024
Mathijn Smit
50 questions

Question 26

Report Export Collapse

Which technology can prevent an unknown executable from being downloaded through a browser session?

Intrusion Prevention

Intrusion Prevention

Insight

Insight

Application Control

Application Control

Advanced Machine Learning

Advanced Machine Learning

Suggested answer: B
Explanation:

Symantec Insight technology can prevent the download of unknown executables through a browser session by leveraging a cloud-based reputation service. Insight assesses the reputation of files based on data collected from millions of endpoints, blocking downloads that are unknown or have a low reputation. This technology is particularly effective against zero-day threats or unknown files that do not yet have established signatures.

asked 13/12/2024
Okan YILDIZ
46 questions

Question 27

Report Export Collapse

What should an administrator know regarding the differences between a Domain and a Tenant in ICDm?

A tenant can contain multiple domains

A tenant can contain multiple domains

Each customer can have one domain and many tenants

Each customer can have one domain and many tenants

A domain can contain multiple tenants

A domain can contain multiple tenants

Each customer can have one tenant and no domains

Each customer can have one tenant and no domains

Suggested answer: A
Explanation:

In Integrated Cyber Defense Manager (ICDm), a tenant can encompass multiple domains, allowing organizations with complex structures to manage security across various groups or departments within a single tenant. Each tenant represents an overarching entity, while domains within a tenant enable separate administration and policy enforcement for different segments, providing flexibility in security management across large enterprises.

asked 13/12/2024
Grant Richardson
42 questions

Question 28

Report Export Collapse

Which type of file attribute is valid for creating a block list entry with Symantec Endpoint Detection and Response (SEDR)?

SHA256

SHA256

Type

Type

Date Created

Date Created

Filename

Filename

Suggested answer: A
Explanation:

When creating a block list entry in Symantec Endpoint Detection and Response (SEDR), the SHA256 hash is a valid file attribute. SHA256 uniquely identifies files based on their content, making it a reliable attribute for ensuring that specific files, regardless of their names or creation dates, are accurately blocked. This hashing method helps prevent identified malicious files from executing, regardless of their locations or renaming attempts by attackers.

asked 13/12/2024
Wanicha Inburan
43 questions

Question 29

Report Export Collapse

Which SES feature helps administrators apply policies based on specific endpoint profiles?

Policy Bundles

Policy Bundles

Device Profiles

Device Profiles

Policy Groups

Policy Groups

Device Groups

Device Groups

Suggested answer: D
Explanation:

In Symantec Endpoint Security (SES), Device Groups enable administrators to apply policies based on specific endpoint profiles. Device Groups categorize endpoints according to characteristics like department, location, or device type, allowing tailored policy application that meets the specific security needs of each group. By using Device Groups, administrators can efficiently manage security policies, ensuring relevant protections are applied based on the endpoint's profile.

asked 13/12/2024
Monterio Weaver
40 questions

Question 30

Report Export Collapse

What should an administrator utilize to identify devices on a Mac?

Become a Premium Member for full access
  Unlock Premium Member
Total 150 questions
Go to page: of 15