ExamGecko
Home / Broadcom / 250-580 / List of questions
Ask Question

Broadcom 250-580 Practice Test - Questions Answers, Page 5

List of questions

Question 41

Report Export Collapse

What Symantec Best Practice is recommended when setting up Active Directory integration with the Symantec Endpoint Protection Manager?

Ensure there is more than one Active Directory Server listed in the Server Properties.

Ensure there is more than one Active Directory Server listed in the Server Properties.

Link the built-in Admin account to an Active Directory account.

Link the built-in Admin account to an Active Directory account.

Import the existing AD structure to organize clients in user mode.

Import the existing AD structure to organize clients in user mode.

Secure the management console by denying access to certain computers.

Secure the management console by denying access to certain computers.

Suggested answer: C
Explanation:

When setting up Active Directory (AD) integration with Symantec Endpoint Protection Manager (SEPM), Symantec's best practice is to import the existing AD structure to manage clients in user mode. This approach offers several benefits:

Simplified Client Management: By importing the AD structure, SEPM can mirror the organizational structure already defined in AD, enabling easier management and assignment of policies to groups or organizational units.

User-Based Policies: Organizing clients in user mode allows policies to follow users across devices, providing consistent protection regardless of where the user logs in.

Streamlined Updates and Permissions: Integration with AD ensures that any changes in user accounts or groups are automatically reflected within SEPM, reducing administrative effort and potential errors in client organization.

This best practice enhances SEPM's functionality by leveraging the established structure in AD.

asked 13/12/2024
Preety Koul
47 questions

Question 42

Report Export Collapse

Which SES security control protects a user against data leakage if they encounter a man-in-the-middle attack?

IPv6 Tunneling

IPv6 Tunneling

IPS

IPS

Firewall

Firewall

VPN

VPN

Suggested answer: B
Explanation:

The Intrusion Prevention System (IPS) in Symantec Endpoint Security (SES) plays a crucial role in defending against data leakage during a man-in-the-middle (MITM) attack. Here's how IPS protects in such scenarios:

Threat Detection: IPS monitors network traffic in real-time, identifying and blocking suspicious patterns that could indicate an MITM attack, such as unauthorized access attempts or abnormal packet patterns.

Prevention of Data Interception: By blocking these threats, IPS prevents malicious actors from intercepting or redirecting user data, thus safeguarding against data leakage.

Automatic Response: IPS is designed to respond immediately, ensuring that attacks are detected and mitigated before sensitive data can be compromised.

By providing proactive protection, IPS ensures that data remains secure even in the face of potential MITM threats.

asked 13/12/2024
Reed G Porter
34 questions

Question 43

Report Export Collapse

What happens when an administrator adds a file to the deny list?

The file is assigned to a chosen Deny List policy

The file is assigned to a chosen Deny List policy

The file is assigned to the Deny List task list

The file is assigned to the Deny List task list

The file is automatically quarantined

The file is automatically quarantined

The file is assigned to the default Deny List policy

The file is assigned to the default Deny List policy

Suggested answer: D
Explanation:

When an administrator adds a file to the deny list in Symantec Endpoint Protection, the file is automatically assigned to the default Deny List policy. This action results in the following:

Immediate Blocking: The file is blocked from executing on any endpoint where the Deny List policy is enforced, effectively preventing the file from causing harm.

Consistent Enforcement: Using the default Deny List policy ensures that the file is denied access across all relevant endpoints without the need for additional customization.

Centralized Management: Administrators can manage and review the default Deny List policy within SEPM, providing an efficient method for handling potentially harmful files across the network.

This default behavior ensures swift response to threats by leveraging a centralized deny list policy.

asked 13/12/2024
jateen chibabhai
45 questions

Question 44

Report Export Collapse

What is a feature of Cynic?

Local Sandboxing

Local Sandboxing

Forwarding event data to Security Information and Event Management (SIEM)

Forwarding event data to Security Information and Event Management (SIEM)

Cloud Sandboxing

Cloud Sandboxing

Customizable OS Images

Customizable OS Images

Suggested answer: C
Explanation:

Cynic is a feature of Symantec Endpoint Security that provides cloud sandboxing capabilities. Cloud sandboxing allows Cynic to analyze suspicious files and behaviors in a secure, isolated cloud environment, identifying potential threats without risking harm to the internal network. Here's how it works:

File Submission to the Cloud: Suspicious files are sent to the cloud-based sandbox for deeper analysis.

Behavioral Analysis: Within the cloud environment, Cynic simulates various conditions to observe the behavior of the file, effectively detecting malware or other harmful actions.

Real-Time Threat Intelligence: Findings are quickly reported back, allowing Symantec Endpoint Protection to take prompt action based on the analysis.

Cloud sandboxing in Cynic provides a scalable, secure, and highly effective approach to advanced threat detection.

asked 13/12/2024
Sébastien PIERRE
54 questions

Question 45

Report Export Collapse

Which IPS signature type is primarily used to identify specific unwanted network traffic?

Attack

Attack

Audit

Audit

Malcode

Malcode

Probe

Probe

Suggested answer: A
Explanation:

Within Symantec Endpoint Protection's Intrusion Prevention System (IPS), Attack signatures are specifically designed to identify and block known patterns of malicious network traffic. Attack signatures focus on:

Recognizing Malicious Patterns: These signatures detect traffic associated with exploitation attempts, such as buffer overflow attacks, SQL injection attempts, or other common attack techniques.

Real-Time Blocking: Once identified, the IPS can immediately block the traffic, preventing the attack from reaching its target.

High Accuracy in Targeted Threats: Attack signatures are tailored to match malicious activities precisely, making them effective for detecting and mitigating specific types of unwanted or harmful network traffic.

Attack signatures, therefore, serve as a primary layer of defense in identifying and managing unwanted network threats.

asked 13/12/2024
Rebecca Gillespie
43 questions

Question 46

Report Export Collapse

Which SES advanced feature detects malware by consulting a training model composed of known good and known bad files?

Signatures

Signatures

Reputation

Reputation

Artificial Intelligence

Artificial Intelligence

Advanced Machine Learning

Advanced Machine Learning

Suggested answer: D
Explanation:

The Advanced Machine Learning feature in Symantec Endpoint Security (SES) uses a sophisticated model trained on a large dataset of known good and known bad files to detect malware effectively. Here's how it functions:

Training Model: The model is built from extensive data on benign and malicious files, allowing it to discern patterns that indicate a file's potential harm.

Predictive Malware Detection: Advanced Machine Learning can detect new and evolving malware strains without relying solely on traditional signature-based methods, offering proactive protection.

Real-Time Decision Making: When SES encounters a file, it consults this model to predict whether the file is likely harmful, enabling quick response to potential threats.

This feature strengthens SES's ability to detect malware dynamically, enhancing endpoint security through intelligent analysis of file attributes.

asked 13/12/2024
Nitharsan Balanavaneethan
56 questions

Question 47

Report Export Collapse

Files are blocked by hash in the deny list policy. Which algorithm is supported, in addition to MD5?

SHA2

SHA2

SHA256

SHA256

SHA256 'salted'

SHA256 'salted'

MD5 'Salted'

MD5 'Salted'

Suggested answer: B
Explanation:

In Symantec Endpoint Protection (SEP), when files are blocked by hash in the deny list policy, SHA256 is supported in addition to MD5. SHA256 provides a more secure hashing algorithm compared to MD5 due to its longer hash length and higher resistance to collisions, making it effective for uniquely identifying and blocking malicious files based on their fingerprint.

asked 13/12/2024
Haider Nassiry
48 questions

Question 48

Report Export Collapse

What is the function of Symantec Insight?

Provides reputation ratings for structured data

Provides reputation ratings for structured data

Enhances the capability of Group Update Providers (GUP)

Enhances the capability of Group Update Providers (GUP)

Increases the efficiency and effectiveness of LiveUpdate

Increases the efficiency and effectiveness of LiveUpdate

Provides reputation ratings for binary executables

Provides reputation ratings for binary executables

Suggested answer: D
Explanation:

Symantec Insight is a technology that delivers reputation ratings for binary executables. This system leverages data from Symantec's Global Intelligence Network, which aggregates information from millions of users worldwide. Here's how it works:

File Reputation Database: Symantec Insight assigns a reputation score to each executable based on various factors, including prevalence, origin, and behavior.

Dynamic Decision Making: By consulting these ratings, SEP can dynamically determine if a file is safe or potentially harmful, allowing or blocking files accordingly.

Reduced False Positives: Insight helps reduce false positives, as it can distinguish between widely used legitimate files and rare, potentially risky files.

This reputation-based approach enhances protection by preemptively identifying suspicious files without relying on traditional signature-based detection alone.

asked 13/12/2024
Test Test
30 questions

Question 49

Report Export Collapse

What does a ranged query return or exclude?

Data matching the exact field names and their values

Data matching the exact field names and their values

Data matching a regular expression

Data matching a regular expression

Data falling between two specified values of a given field

Data falling between two specified values of a given field

Data based on specific values for a given field

Data based on specific values for a given field

Suggested answer: C
Explanation:

A ranged query in Symantec Endpoint Security returns or excludes data that falls between two specified values for a given field. This type of query is beneficial for filtering data within specific numeric or date ranges. For instance:

Numeric Ranges: Ranged queries can be used to filter data based on a range of values, such as finding log entries with file sizes between certain values.

Date Ranges: Similarly, ranged queries can isolate data entries within a specific date range, which is useful for time-bound analysis.

This functionality allows for more targeted data retrieval, making it easier to analyze and report specific subsets of data.

asked 13/12/2024
Volkan Ozsoy
39 questions

Question 50

Report Export Collapse

Which type of security threat continues to threaten endpoint security after a system reboot?

file-less

file-less

memory attack

memory attack

script

script

Rootkit

Rootkit

Suggested answer: D
Explanation:

A Rootkit is a type of security threat that can persist across system reboots, making it difficult to detect and remove. Rootkits operate by embedding themselves deep within the operating system, often at the kernel level, and they can disguise their presence by intercepting and modifying standard operating system functionality. Here's how they maintain persistence:

Kernel-Level Integration: Rootkits modify core operating system files, allowing them to load during the boot process and remain active after reboots.

Stealth Techniques: By hiding from regular security checks, rootkits avoid detection by conventional anti-virus and anti-malware tools.

Persistence Mechanism: The modifications rootkits make ensure they start up again after each reboot, enabling continuous threat activity on the compromised system.

Due to their persistence and stealth, rootkits present significant challenges for endpoint security.

asked 13/12/2024
Robert Fox
56 questions
Total 150 questions
Go to page: of 15