Broadcom 250-580 Practice Test - Questions Answers, Page 5
List of questions
Question 41
What Symantec Best Practice is recommended when setting up Active Directory integration with the Symantec Endpoint Protection Manager?
Question 42
Which SES security control protects a user against data leakage if they encounter a man-in-the-middle attack?
Question 43
What happens when an administrator adds a file to the deny list?
Question 44
What is a feature of Cynic?
Question 45
Which IPS signature type is primarily used to identify specific unwanted network traffic?
Question 46
Which SES advanced feature detects malware by consulting a training model composed of known good and known bad files?
Question 47
Files are blocked by hash in the deny list policy. Which algorithm is supported, in addition to MD5?
Question 48
What is the function of Symantec Insight?
Question 49
What does a ranged query return or exclude?
Question 50
Which type of security threat continues to threaten endpoint security after a system reboot?
Question