Broadcom 250-580 Practice Test - Questions Answers, Page 5
List of questions
Question 41

What Symantec Best Practice is recommended when setting up Active Directory integration with the Symantec Endpoint Protection Manager?
Ensure there is more than one Active Directory Server listed in the Server Properties.
Link the built-in Admin account to an Active Directory account.
Import the existing AD structure to organize clients in user mode.
Secure the management console by denying access to certain computers.
When setting up Active Directory (AD) integration with Symantec Endpoint Protection Manager (SEPM), Symantec's best practice is to import the existing AD structure to manage clients in user mode. This approach offers several benefits:
Simplified Client Management: By importing the AD structure, SEPM can mirror the organizational structure already defined in AD, enabling easier management and assignment of policies to groups or organizational units.
User-Based Policies: Organizing clients in user mode allows policies to follow users across devices, providing consistent protection regardless of where the user logs in.
Streamlined Updates and Permissions: Integration with AD ensures that any changes in user accounts or groups are automatically reflected within SEPM, reducing administrative effort and potential errors in client organization.
This best practice enhances SEPM's functionality by leveraging the established structure in AD.
Question 42

Which SES security control protects a user against data leakage if they encounter a man-in-the-middle attack?
IPv6 Tunneling
IPS
Firewall
VPN
The Intrusion Prevention System (IPS) in Symantec Endpoint Security (SES) plays a crucial role in defending against data leakage during a man-in-the-middle (MITM) attack. Here's how IPS protects in such scenarios:
Threat Detection: IPS monitors network traffic in real-time, identifying and blocking suspicious patterns that could indicate an MITM attack, such as unauthorized access attempts or abnormal packet patterns.
Prevention of Data Interception: By blocking these threats, IPS prevents malicious actors from intercepting or redirecting user data, thus safeguarding against data leakage.
Automatic Response: IPS is designed to respond immediately, ensuring that attacks are detected and mitigated before sensitive data can be compromised.
By providing proactive protection, IPS ensures that data remains secure even in the face of potential MITM threats.
Question 43

What happens when an administrator adds a file to the deny list?
The file is assigned to a chosen Deny List policy
The file is assigned to the Deny List task list
The file is automatically quarantined
The file is assigned to the default Deny List policy
When an administrator adds a file to the deny list in Symantec Endpoint Protection, the file is automatically assigned to the default Deny List policy. This action results in the following:
Immediate Blocking: The file is blocked from executing on any endpoint where the Deny List policy is enforced, effectively preventing the file from causing harm.
Consistent Enforcement: Using the default Deny List policy ensures that the file is denied access across all relevant endpoints without the need for additional customization.
Centralized Management: Administrators can manage and review the default Deny List policy within SEPM, providing an efficient method for handling potentially harmful files across the network.
This default behavior ensures swift response to threats by leveraging a centralized deny list policy.
Question 44

What is a feature of Cynic?
Local Sandboxing
Forwarding event data to Security Information and Event Management (SIEM)
Cloud Sandboxing
Customizable OS Images
Cynic is a feature of Symantec Endpoint Security that provides cloud sandboxing capabilities. Cloud sandboxing allows Cynic to analyze suspicious files and behaviors in a secure, isolated cloud environment, identifying potential threats without risking harm to the internal network. Here's how it works:
File Submission to the Cloud: Suspicious files are sent to the cloud-based sandbox for deeper analysis.
Behavioral Analysis: Within the cloud environment, Cynic simulates various conditions to observe the behavior of the file, effectively detecting malware or other harmful actions.
Real-Time Threat Intelligence: Findings are quickly reported back, allowing Symantec Endpoint Protection to take prompt action based on the analysis.
Cloud sandboxing in Cynic provides a scalable, secure, and highly effective approach to advanced threat detection.
Question 45

Which IPS signature type is primarily used to identify specific unwanted network traffic?
Attack
Audit
Malcode
Probe
Within Symantec Endpoint Protection's Intrusion Prevention System (IPS), Attack signatures are specifically designed to identify and block known patterns of malicious network traffic. Attack signatures focus on:
Recognizing Malicious Patterns: These signatures detect traffic associated with exploitation attempts, such as buffer overflow attacks, SQL injection attempts, or other common attack techniques.
Real-Time Blocking: Once identified, the IPS can immediately block the traffic, preventing the attack from reaching its target.
High Accuracy in Targeted Threats: Attack signatures are tailored to match malicious activities precisely, making them effective for detecting and mitigating specific types of unwanted or harmful network traffic.
Attack signatures, therefore, serve as a primary layer of defense in identifying and managing unwanted network threats.
Question 46

Which SES advanced feature detects malware by consulting a training model composed of known good and known bad files?
Signatures
Reputation
Artificial Intelligence
Advanced Machine Learning
The Advanced Machine Learning feature in Symantec Endpoint Security (SES) uses a sophisticated model trained on a large dataset of known good and known bad files to detect malware effectively. Here's how it functions:
Training Model: The model is built from extensive data on benign and malicious files, allowing it to discern patterns that indicate a file's potential harm.
Predictive Malware Detection: Advanced Machine Learning can detect new and evolving malware strains without relying solely on traditional signature-based methods, offering proactive protection.
Real-Time Decision Making: When SES encounters a file, it consults this model to predict whether the file is likely harmful, enabling quick response to potential threats.
This feature strengthens SES's ability to detect malware dynamically, enhancing endpoint security through intelligent analysis of file attributes.
Question 47

Files are blocked by hash in the deny list policy. Which algorithm is supported, in addition to MD5?
SHA2
SHA256
SHA256 'salted'
MD5 'Salted'
In Symantec Endpoint Protection (SEP), when files are blocked by hash in the deny list policy, SHA256 is supported in addition to MD5. SHA256 provides a more secure hashing algorithm compared to MD5 due to its longer hash length and higher resistance to collisions, making it effective for uniquely identifying and blocking malicious files based on their fingerprint.
Question 48

What is the function of Symantec Insight?
Provides reputation ratings for structured data
Enhances the capability of Group Update Providers (GUP)
Increases the efficiency and effectiveness of LiveUpdate
Provides reputation ratings for binary executables
Symantec Insight is a technology that delivers reputation ratings for binary executables. This system leverages data from Symantec's Global Intelligence Network, which aggregates information from millions of users worldwide. Here's how it works:
File Reputation Database: Symantec Insight assigns a reputation score to each executable based on various factors, including prevalence, origin, and behavior.
Dynamic Decision Making: By consulting these ratings, SEP can dynamically determine if a file is safe or potentially harmful, allowing or blocking files accordingly.
Reduced False Positives: Insight helps reduce false positives, as it can distinguish between widely used legitimate files and rare, potentially risky files.
This reputation-based approach enhances protection by preemptively identifying suspicious files without relying on traditional signature-based detection alone.
Question 49

What does a ranged query return or exclude?
Data matching the exact field names and their values
Data matching a regular expression
Data falling between two specified values of a given field
Data based on specific values for a given field
A ranged query in Symantec Endpoint Security returns or excludes data that falls between two specified values for a given field. This type of query is beneficial for filtering data within specific numeric or date ranges. For instance:
Numeric Ranges: Ranged queries can be used to filter data based on a range of values, such as finding log entries with file sizes between certain values.
Date Ranges: Similarly, ranged queries can isolate data entries within a specific date range, which is useful for time-bound analysis.
This functionality allows for more targeted data retrieval, making it easier to analyze and report specific subsets of data.
Question 50

Which type of security threat continues to threaten endpoint security after a system reboot?
file-less
memory attack
script
Rootkit
A Rootkit is a type of security threat that can persist across system reboots, making it difficult to detect and remove. Rootkits operate by embedding themselves deep within the operating system, often at the kernel level, and they can disguise their presence by intercepting and modifying standard operating system functionality. Here's how they maintain persistence:
Kernel-Level Integration: Rootkits modify core operating system files, allowing them to load during the boot process and remain active after reboots.
Stealth Techniques: By hiding from regular security checks, rootkits avoid detection by conventional anti-virus and anti-malware tools.
Persistence Mechanism: The modifications rootkits make ensure they start up again after each reboot, enabling continuous threat activity on the compromised system.
Due to their persistence and stealth, rootkits present significant challenges for endpoint security.
Question