ExamGecko
Home / Broadcom / 250-580 / List of questions
Ask Question

Broadcom 250-580 Practice Test - Questions Answers, Page 4

Add to Whishlist

List of questions

Question 31

Report Export Collapse

What is an appropriate use of a file fingerprint list?

Become a Premium Member for full access
  Unlock Premium Member

Question 32

Report Export Collapse

What is the purpose of a Threat Defense for Active Directory Deceptive Account?

Become a Premium Member for full access
  Unlock Premium Member

Question 33

Report Export Collapse

When are events generated within SEDR?

Become a Premium Member for full access
  Unlock Premium Member

Question 34

Report Export Collapse

What tool can administrators use to create custom behavioral isolation policies based on collected application behavior data?

Become a Premium Member for full access
  Unlock Premium Member

Question 35

Report Export Collapse

A file has been identified as malicious.

Which feature of SEDR allows an administrator to manually block a specific file hash?

Become a Premium Member for full access
  Unlock Premium Member

Question 36

Report Export Collapse

How does IPS check custom signatures?

Become a Premium Member for full access
  Unlock Premium Member

Question 37

Report Export Collapse

An Application Control policy includes an Allowed list and a Blocked list. A user wants to use an application that is neither on the Allowed list nor on the Blocked list. What can the user do to gain access to the application?

Become a Premium Member for full access
  Unlock Premium Member

Question 38

Report Export Collapse

What does an end-user receive when an administrator utilizes the Invite User feature to distribute the SES client?

Become a Premium Member for full access
  Unlock Premium Member

Question 39

Report Export Collapse

An organization identifies a threat in its environment and needs to limit the spread of the threat. How should the SEP Administrator block the threat using Application and Device Control?

Become a Premium Member for full access
  Unlock Premium Member

Question 40

Report Export Collapse

What EDR feature provides endpoint activity recorder data for a file hash?

Become a Premium Member for full access
  Unlock Premium Member
Total 150 questions
Go to page: of 15