Broadcom 250-580 Practice Test - Questions Answers, Page 4

List of questions
Question 31

What is an appropriate use of a file fingerprint list?
Question 32

What is the purpose of a Threat Defense for Active Directory Deceptive Account?
Question 33

When are events generated within SEDR?
Question 34

What tool can administrators use to create custom behavioral isolation policies based on collected application behavior data?
Question 35

A file has been identified as malicious.
Which feature of SEDR allows an administrator to manually block a specific file hash?
Question 36

How does IPS check custom signatures?
Question 37

An Application Control policy includes an Allowed list and a Blocked list. A user wants to use an application that is neither on the Allowed list nor on the Blocked list. What can the user do to gain access to the application?
Question 38

What does an end-user receive when an administrator utilizes the Invite User feature to distribute the SES client?
Question 39

An organization identifies a threat in its environment and needs to limit the spread of the threat. How should the SEP Administrator block the threat using Application and Device Control?
Question 40

What EDR feature provides endpoint activity recorder data for a file hash?
Question