ExamGecko
Home / Broadcom / 250-580 / List of questions
Ask Question

Broadcom 250-580 Practice Test - Questions Answers, Page 4

List of questions

Question 31

Report Export Collapse

What is an appropriate use of a file fingerprint list?

Allow unknown files to be downloaded with Insight

Allow unknown files to be downloaded with Insight

Prevent programs from running

Prevent programs from running

Prevent Antivirus from scanning a file

Prevent Antivirus from scanning a file

Allow files to bypass Intrusion Prevention detection

Allow files to bypass Intrusion Prevention detection

Suggested answer: B
Explanation:

A file fingerprint list is used to prevent specific programs from running by identifying them through unique file attributes (such as hashes). This list allows administrators to create block rules based on known malicious or unwanted file fingerprints, ensuring these programs cannot execute on the system. This approach is particularly effective in enforcing application control and preventing unauthorized software from running.

asked 13/12/2024
Albert Smith
44 questions

Question 32

Report Export Collapse

What is the purpose of a Threat Defense for Active Directory Deceptive Account?

It prevents attackers from reading the contents of the Domain Admins Group.

It prevents attackers from reading the contents of the Domain Admins Group.

It assigns a fake NTLM password hash value for users with an assigned AdminCount attribute.

It assigns a fake NTLM password hash value for users with an assigned AdminCount attribute.

It exposes attackers as they seek to gather credential information from workstation memory.

It exposes attackers as they seek to gather credential information from workstation memory.

It acts as a honeypot to expose attackers as they attempt to build their AD treasure map

It acts as a honeypot to expose attackers as they attempt to build their AD treasure map

Suggested answer: D
Explanation:

The Threat Defense for Active Directory (AD) Deceptive Account feature serves as a honeypot within Active Directory, designed to lure attackers who are attempting to map out AD for valuable accounts or resources. By using deceptive accounts, this feature can expose attackers' reconnaissance activities, such as attempts to gather credential information or access sensitive accounts. This strategy helps detect attackers early by observing interactions with fake accounts set up to appear as attractive targets.

asked 13/12/2024
Ray Savage
28 questions

Question 33

Report Export Collapse

When are events generated within SEDR?

When an incident is selected

When an incident is selected

When an activity occurs

When an activity occurs

When any event is opened

When any event is opened

When entities are viewed

When entities are viewed

Suggested answer: B
Explanation:

In Symantec Endpoint Detection and Response (SEDR), events are generated when an activity occurs. This includes any actions or behaviors detected by the system, such as file modifications, network connections, or process launches that could indicate a potential threat. The generation of events in response to activities enables SEDR to provide real-time monitoring and logging, essential for effective threat detection and response.

asked 13/12/2024
Martynas Abrutis
43 questions

Question 34

Report Export Collapse

What tool can administrators use to create custom behavioral isolation policies based on collected application behavior data?

Behavioral Prevalence Check

Behavioral Prevalence Check

Behavioral Heat Map

Behavioral Heat Map

Application Catalog

Application Catalog

Application Frequency Map

Application Frequency Map

Suggested answer: C
Explanation:

Administrators can use the Application Catalog in Symantec Endpoint Security to create custom behavioral isolation policies. This tool compiles data on application behavior, enabling administrators to define isolation policies that address specific behaviors observed within their environment. By leveraging the Application Catalog, administrators can tailor policies based on the behaviors of applications, enhancing the control and containment of potentially malicious activity.

asked 13/12/2024
terence o oneill
46 questions

Question 35

Report Export Collapse

A file has been identified as malicious.

Which feature of SEDR allows an administrator to manually block a specific file hash?

Playbooks

Playbooks

Quarantine

Quarantine

Allow List

Allow List

Block List

Block List

Suggested answer: D
Explanation:

In Symantec Endpoint Detection and Response (SEDR), the Block List feature allows administrators to manually block a specific file hash identified as malicious. By adding the hash of the malicious file to the Block List, SEDR ensures that the file cannot execute or interact with the network, preventing further harm. This manual blocking capability provides administrators with direct control over specific threats detected in their environment.

asked 13/12/2024
matthew kim
43 questions

Question 36

Report Export Collapse

How does IPS check custom signatures?

IPS checks for signatures listed in the table. When a detection matches an inbound or outbound traffic packet, the IPS engine continues checking for other signatures.

IPS checks for signatures listed in the table. When a detection matches an inbound or outbound traffic packet, the IPS engine continues checking for other signatures.

IPS checks for signatures listed in the table. When a detection matches an inbound or outbound traffic packet, the IPS engine restarts checking for signatures.

IPS checks for signatures listed in the table. When a detection matches an inbound or outbound traffic packet, the IPS engine restarts checking for signatures.

IPS checks for signatures listed in the table. When a detection matches an inbound or outbound traffic packet, the IPS engine stops checking other signatures.

IPS checks for signatures listed in the table. When a detection matches an inbound or outbound traffic packet, the IPS engine stops checking other signatures.

IPS checks for signatures listed in the table. When a detection matches an inbound or outbound traffic packet, the IPS engine logs the other signatures.

IPS checks for signatures listed in the table. When a detection matches an inbound or outbound traffic packet, the IPS engine logs the other signatures.

Suggested answer: C
Explanation:

The Intrusion Prevention System (IPS) in Symantec Endpoint Protection operates by scanning inbound and outbound traffic packets against a defined list of signatures. This process aims to identify known attack patterns or anomalies that signify potential security threats.

When IPS detects a match in the traffic packet based on these custom signatures, the following sequence occurs:

Initial Detection and Match: The IPS engine actively monitors traffic in real-time, referencing its signature table. Each packet is checked sequentially until a match is found.

Halting Further Checks: Upon matching a signature with the inbound or outbound traffic, the IPS engine terminates further checks for other signatures in the same traffic packet. This design conserves system resources and optimizes performance by avoiding redundant processing once a threat has been identified.

Action on Detection: After identifying and confirming the threat based on the matched signature, the IPS engine enforces configured responses, such as blocking the packet, alerting administrators, or logging the event.

This approach ensures efficient threat detection by focusing only on the first detected signature, which prevents unnecessary processing overhead and ensures rapid incident response.

asked 13/12/2024
Vicky Mukhy
37 questions

Question 37

Report Export Collapse

An Application Control policy includes an Allowed list and a Blocked list. A user wants to use an application that is neither on the Allowed list nor on the Blocked list. What can the user do to gain access to the application?

Email the App Control Admin

Email the App Control Admin

Request an Override

Request an Override

Install the application

Install the application

Wait for the Application Drift process to complete

Wait for the Application Drift process to complete

Suggested answer: B
Explanation:

In Symantec Endpoint Protection (SEP) Application Control policies, applications are managed through lists: an Allowed list (applications approved for use) and a Blocked list (applications restricted or prohibited). When a user encounters an application that is not explicitly on either the Allowed or Blocked list, it falls into a neutral category.

For accessing this application, the typical process includes:

Requesting an Override: The user can initiate a request to temporarily or permanently allow access to the application. This process usually involves contacting the administrator or following a specified override protocol to gain necessary permissions.

Administrator Review: Upon receiving the override request, the administrator evaluates the application to ensure it aligns with organizational security policies and compliance standards.

Override Approval: If deemed safe, the application may be added to the Allowed list, granting the user access.

This request mechanism ensures that unlisted appli

asked 13/12/2024
Joe Mon
32 questions

Question 38

Report Export Collapse

What does an end-user receive when an administrator utilizes the Invite User feature to distribute the SES client?

An email with the SES_setup.zip file attached

An email with the SES_setup.zip file attached

An email with a link to register on the ICDm user portal

An email with a link to register on the ICDm user portal

An email with a link to directly download the SES client

An email with a link to directly download the SES client

An email with a link to a KB article explaining how to install the SES Agent

An email with a link to a KB article explaining how to install the SES Agent

Suggested answer: C
Explanation:

When an administrator uses the 'Invite User' feature to distribute the Symantec Endpoint Security (SES) client, the end-user receives a direct link via email to download the SES client. This email typically includes:

Download Link: The email provides a secure link that directs the user to download the SES client installer directly from Symantec's servers or a managed distribution location.

Installation Instructions: Clear instructions are often included to assist the end-user with installing the SES client on their device.

User Access Simplification: This approach streamlines the installation process by reducing the steps required for the user, making it convenient and ensuring they receive the correct client version.

This method enhances security and user convenience, as the SES client download is directly verified by the system, ensuring that the correct version is deployed.

asked 13/12/2024
Sergio Quintero Angel
43 questions

Question 39

Report Export Collapse

An organization identifies a threat in its environment and needs to limit the spread of the threat. How should the SEP Administrator block the threat using Application and Device Control?

Gather the MD5 hash of the file and create an Application Content Rule that blocks the file based on the file fingerprint.

Gather the MD5 hash of the file and create an Application Content Rule that blocks the file based on the file fingerprint.

Gather the process name of the file and create an Application Content Rule that blocks the file based on the device ID type.

Gather the process name of the file and create an Application Content Rule that blocks the file based on the device ID type.

Gather the MD5 hash of the file and create an Application Content Rule that uses regular expression matching.

Gather the MD5 hash of the file and create an Application Content Rule that uses regular expression matching.

Gather the MD5 hash of the file and create an Application Content Rule that blocks the file based on specific arguments.

Gather the MD5 hash of the file and create an Application Content Rule that blocks the file based on specific arguments.

Suggested answer: A
Explanation:

When a threat is detected within an organization's environment, preventing its spread becomes crucial. Symantec Endpoint Protection (SEP) allows administrators to create Application and Device Control policies that target specific threat files to block them across the network. To block a known malicious file, the administrator should:

Identify the File MD5 Hash: The MD5 hash serves as a unique 'fingerprint' for the malicious file, ensuring that the specific file version can be accurately identified across systems.

Create an Application Content Rule: Using the Application and Device Control feature, the administrator can create a content rule that targets the identified file by its MD5 hash, effectively blocking it based on its fingerprint.

Apply the Rule Across Endpoints: Once created, this rule is applied to endpoints, preventing the file from executing or spreading.

This method ensures precise blocking of the threat without impacting other files or processes.

asked 13/12/2024
None None
45 questions

Question 40

Report Export Collapse

What EDR feature provides endpoint activity recorder data for a file hash?

Process Dump

Process Dump

Entity Dump

Entity Dump

Hash Dump

Hash Dump

Full Dump

Full Dump

Suggested answer: B
Explanation:

In Symantec Endpoint Detection and Response (EDR), the Entity Dump feature provides detailed activity recorder data related to a specific file hash. This data is essential for understanding the behavior and origin of a suspicious file, as well as tracking its activity across endpoints. Here's how it works:

Hash-Based Search: The EDR solution allows the administrator to search by file hash, which helps retrieve a history of the file's interactions and activities.

Entity Dump Retrieval: Selecting the Entity Dump option provides comprehensive data, including process execution, file modification, network connections, and other endpoint interactions related to the file.

Enhanced Threat Analysis: By analyzing this information, the administrator gains insights into how the threat may have propagated, aiding in containment and mitigation efforts.

The Entity Dump is thus a vital tool in forensic analysis, providing detailed endpoint activity data for specified file hashes.

asked 13/12/2024
Ramesh Kumar Patel
39 questions
Total 150 questions
Go to page: of 15