Broadcom 250-580 Practice Test - Questions Answers, Page 3

List of questions
Question 21

An administrator changes the Virus and Spyware Protection policy for a specific group that disables Auto-Protect. The administrator assigns the policy and the client systems apply the corresponding policy serial number. Upon visual inspection of a physical client system, the policy serial number is correct. However, Auto-Protect is still enabled on the client system.
Which action should the administrator take to ensure that the desired setting is in place for the client?
Restart the client system
Run a command on the computer to Update Content
Enable the padlock next to the setting in the policy
Withdraw the Virus and Spyware Protection policy
If an administrator modifies the Virus and Spyware Protection policy to disable Auto-Protect, but finds it still enabled on the client, the likely cause is that the setting was not locked. In Symantec Endpoint Protection policies, enabling the padlock icon next to a setting ensures that the policy is enforced strictly, overriding local client configurations. Without this lock, clients may retain previous settings despite the new policy. Locking the setting guarantees that the desired configuration is applied consistently across all clients within the specified group.
Question 22

In the virus and Spyware Protection policy, an administrator sets the First action to Clean risk and sets If first action fails to Delete risk. Which two (2) factors should the administrator consider? (Select two.)
The deleted file may still be in the Recycle Bin.
IT Analytics may keep a copy of the file for investigation.
False positives may delete legitimate files.
Insight may back up the file before sending it to Symantec.
A copy of the threat may still be in the quarantine.
When configuring a Virus and Spyware Protection policy with the actions to 'Clean risk' first and 'Delete risk' if cleaning fails, two important considerations are:
False Positives (C): There is a risk that legitimate files may be falsely identified as threats and deleted if the cleaning action fails. This outcome underscores the importance of careful policy configuration to avoid loss of important files.
Quarantine Copy (E): Even if a file is deleted, a copy might still remain in the quarantine. This backup allows for retrieval if the deletion was a false positive or if further analysis of the file is required for investigation purposes.
These considerations help administrators avoid unintended data loss and maintain flexibility for future review of quarantined threats.
Question 23

What protection technology should an administrator enable to prevent double executable file names of ransomware variants like Cryptolocker from running?
Download Insight
Intrusion Prevention System
SONAR
Memory Exploit Mitigation
To prevent ransomware variants, such as Cryptolocker, from executing with double executable file names, an administrator should enable SONAR (Symantec Online Network for Advanced Response). SONAR detects and blocks suspicious behaviors based on file characteristics and real-time monitoring, which is effective in identifying malicious patterns associated with ransomware. By analyzing unusual behaviors, such as double executable file names, SONAR provides proactive protection against ransomware threats before they can cause harm to the system.
Question 24

Which Indicator of Compromise might be detected as variations in the behavior of privileged users that indicate that their account is being used by someone else to gain a foothold in an environment?
Mismatched Port - Application Traffic
Irregularities in Privileged User Account Activity
Surges in Database Read Volume
Geographical Irregularities
An Indicator of Compromise (IOC), such as irregularities in privileged user account activity, can signal that a privileged account may be compromised and used maliciously. This can involve deviations from typical login times, unusual commands or requests, or access to resources not typically utilized by the user. Monitoring such anomalies can help detect when an attacker has gained access to a privileged account and is attempting to establish control within the environment.
Question 25

Why is Active Directory a part of nearly every targeted attack?
AD administration is managed by weak legacy APIs.
AD is, by design, an easily accessed flat file name space directory database
AD exposes all of its identities, applications, and resources to every endpoint in the network
AD user attribution includes hidden elevated admin privileges
Active Directory (AD) is commonly targeted in attacks because it serves as a central directory for user identities, applications, and resources accessible across the network. This visibility makes it an attractive target for attackers to exploit for lateral movement, privilege escalation, and reconnaissance. Once compromised, AD provides attackers with significant insight into an organization's internal structure, enabling further exploitation and access to sensitive data.
Question 26

Which technology can prevent an unknown executable from being downloaded through a browser session?
Intrusion Prevention
Insight
Application Control
Advanced Machine Learning
Symantec Insight technology can prevent the download of unknown executables through a browser session by leveraging a cloud-based reputation service. Insight assesses the reputation of files based on data collected from millions of endpoints, blocking downloads that are unknown or have a low reputation. This technology is particularly effective against zero-day threats or unknown files that do not yet have established signatures.
Question 27

What should an administrator know regarding the differences between a Domain and a Tenant in ICDm?
A tenant can contain multiple domains
Each customer can have one domain and many tenants
A domain can contain multiple tenants
Each customer can have one tenant and no domains
In Integrated Cyber Defense Manager (ICDm), a tenant can encompass multiple domains, allowing organizations with complex structures to manage security across various groups or departments within a single tenant. Each tenant represents an overarching entity, while domains within a tenant enable separate administration and policy enforcement for different segments, providing flexibility in security management across large enterprises.
Question 28

Which type of file attribute is valid for creating a block list entry with Symantec Endpoint Detection and Response (SEDR)?
SHA256
Type
Date Created
Filename
When creating a block list entry in Symantec Endpoint Detection and Response (SEDR), the SHA256 hash is a valid file attribute. SHA256 uniquely identifies files based on their content, making it a reliable attribute for ensuring that specific files, regardless of their names or creation dates, are accurately blocked. This hashing method helps prevent identified malicious files from executing, regardless of their locations or renaming attempts by attackers.
Question 29

Which SES feature helps administrators apply policies based on specific endpoint profiles?
Policy Bundles
Device Profiles
Policy Groups
Device Groups
In Symantec Endpoint Security (SES), Device Groups enable administrators to apply policies based on specific endpoint profiles. Device Groups categorize endpoints according to characteristics like department, location, or device type, allowing tailored policy application that meets the specific security needs of each group. By using Device Groups, administrators can efficiently manage security policies, ensuring relevant protections are applied based on the endpoint's profile.
Question 30

What should an administrator utilize to identify devices on a Mac?
Question