ExamGecko
Home / Broadcom / 250-580 / List of questions
Ask Question

Broadcom 250-580 Practice Test - Questions Answers, Page 6

List of questions

Question 51

Report Export Collapse

What information is required to calculate storage requirements?

Number of endpoints, available bandwidth, available disk space, number of endpoint dumps, dump size

Number of endpoints, available bandwidth, available disk space, number of endpoint dumps, dump size

Number of endpoints, EAR data per endpoint per day, number of days to retain, number of endpoint dumps, dump size

Number of endpoints, EAR data per endpoint per day, number of days to retain, number of endpoint dumps, dump size

Number of endpoints, available bandwidth, number of days to retain, number of endpoint dumps, dump size

Number of endpoints, available bandwidth, number of days to retain, number of endpoint dumps, dump size

Number of endpoints, EAR data per endpoint per day, available disk space, number of endpoint dumps, dump size

Number of endpoints, EAR data per endpoint per day, available disk space, number of endpoint dumps, dump size

Suggested answer: B
Explanation:

Calculating storage requirements for Symantec Endpoint Security (SES) involves gathering specific information related to data retention and event storage needs. The required information includes:

Number of Endpoints: Determines the scale of data to be managed.

EAR Data per Endpoint per Day: Refers to the Endpoint Activity Recorder (EAR) data generated by each endpoint daily, affecting storage usage.

Number of Days to Retain: Indicates the data retention period, which impacts the total volume of stored data.

Number of Endpoint Dumps and Dump Size: These parameters define the size and number of memory dumps, which are essential for forensic analysis and troubleshooting.

This information allows accurate calculation of storage needs, ensuring adequate capacity for logs, dumps, and activity data.

asked 13/12/2024
Nagarajapandian T
34 questions

Question 52

Report Export Collapse

The LiveUpdate Download Schedule is set to the default on the Symantec Endpoint Protection Manager (SEPM).

How many content revisions must the SEPM keep to ensure clients that check in to the SEPM every 10 days receive xdelta content packages instead of full content packages?

10

10

20

20

30

30

60

60

Suggested answer: C
Explanation:

To ensure that clients checking in every 10 days receive xdelta content packages instead of full content packages, 30 content revisions must be retained on the Symantec Endpoint Protection Manager (SEPM). Here's why:

Incremental Updates: xdelta packages are incremental updates that only download changes since the last update, conserving bandwidth and speeding up client updates.

Content Revision Retention: SEPM needs to retain a sufficient number of content revisions to allow clients that check in intermittently (such as every 10 days) to download incremental rather than full content packages.

Default Retention Recommendation: Retaining 30 content revisions ensures that clients are covered for up to 10 days of updates, meeting the requirement for xdelta delivery.

This setup optimizes resource usage by reducing the load on network and client systems.

asked 13/12/2024
PKE Holding AG Leitgeb
40 questions

Question 53

Report Export Collapse

Which two (2) criteria are used by Symantec Insight to evaluate binary executables? (Select two.)

Sensitivity

Sensitivity

Prevalence

Prevalence

Confidentiality

Confidentiality

Content

Content

Age

Age

Suggested answer: B, E
Explanation:

Symantec Insight uses Prevalence and Age as two primary criteria to evaluate binary executables. These metrics help determine the likelihood that a file is either benign or malicious based on its behavior across a broad user base:

Prevalence: This metric assesses how widely a file is used across Symantec's global community. Files with higher prevalence are generally more likely to be safe, while rare files may pose higher risks.

Age: The age of a file is also considered. Older files with a stable reputation are less likely to be malicious, whereas newer, unverified files are scrutinized more closely.

Using these criteria, Symantec Insight provides reliable reputation ratings for binary files, enhancing endpoint security by preemptively identifying potential threats.

asked 13/12/2024
Tiago Carvalho
49 questions

Question 54

Report Export Collapse

What must be entered before downloading a file from ICDm?

Name

Name

Password

Password

Hash

Hash

Date

Date

Suggested answer: C
Explanation:

Before downloading a file from the Integrated Cyber Defense Manager (ICDm), the hash of the file must be entered. The hash serves as a unique identifier for the file, ensuring that the correct file is downloaded and verifying its integrity. Here's why this is necessary:

File Verification: By entering the hash, users confirm they are accessing the correct file, which prevents accidental downloads of unrelated or potentially harmful files.

Security Measure: The hash requirement adds an additional layer of security, helping to prevent unauthorized downloads or distribution of sensitive files.

This practice ensures accurate and secure file management within ICDm.

asked 13/12/2024
Daniel Calleja
38 questions

Question 55

Report Export Collapse

Which report template type should an administrator utilize to create a daily summary of network threats detected?

Intrusion Prevention Report

Intrusion Prevention Report

Blocked Threats Report

Blocked Threats Report

Network Risk Report

Network Risk Report

Access Violation Report

Access Violation Report

Suggested answer: C
Explanation:

To create a daily summary of network threats detected, an administrator should use the Network Risk Report template. This report template provides a comprehensive overview of threats within the network, including:

Summary of Threats Detected: It consolidates data on threats, providing a summary of recent detections across the network.

Insight into Network Security Posture: The report helps administrators understand the types and frequency of network threats, enabling them to make informed decisions on security measures.

Daily Monitoring: Using this report on a daily basis allows administrators to maintain an up-to-date view of the network's risk profile and respond promptly to emerging threats.

The Network Risk Report template is ideal for regular monitoring of network security events.

asked 13/12/2024
Duane Innmon
28 questions

Question 56

Report Export Collapse

An organization recently experienced an outbreak and is conducting a health check of the environment. What Protection Technology can the SEP team enable to control and monitor the behavior of applications?

Host Integrity

Host Integrity

System Lockdown

System Lockdown

Application Control

Application Control

Behavior Monitoring (SONAR)

Behavior Monitoring (SONAR)

Suggested answer: C
Explanation:

Application Control in Symantec Endpoint Protection (SEP) provides the SEP team with the ability to control and monitor the behavior of applications. This technology enables administrators to set policies that restrict or allow specific application behaviors, effectively controlling the environment and reducing risk from unauthorized or harmful applications. Here's how it works:

Policy-Based Controls: Administrators can create policies that define which applications are allowed or restricted, preventing unauthorized applications from executing.

Behavior Monitoring: Application Control can monitor application actions, detecting unusual or potentially harmful behaviors and alerting administrators.

Enhanced Security: By controlling application behavior, SEP helps mitigate threats by preventing suspicious applications from affecting the environment, which is particularly valuable in post-outbreak recovery and ongoing health checks.

Application Control thus strengthens endpoint defenses by enabling real-time management of application behaviors.

asked 13/12/2024
Stergios Gaidatzis
44 questions

Question 57

Report Export Collapse

What type of Threat Defense for Active Directory alarms are displayed after domain misconfigurations or hidden backdoors are detected?

Computer Information Gathering

Computer Information Gathering

Pass-The-Ticket

Pass-The-Ticket

Credential Theft

Credential Theft

Dark Corners

Dark Corners

Suggested answer: D
Explanation:

Dark Corners alarms are part of Threat Defense for Active Directory and are triggered when domain misconfigurations or hidden backdoors are detected within the directory environment. Here's how this alarm functions:

Detection of Hidden Threats: Dark Corners identifies and alerts administrators to hidden vulnerabilities within the Active Directory, such as unauthorized access paths or misconfigurations that could be exploited.

Security Assurance: By identifying these issues, administrators can proactively address and rectify potential risks that are otherwise challenging to detect.

Improved Active Directory Security: The Dark Corners alarm helps ensure that backdoors and misconfigurations do not provide attackers with hidden access points, strengthening the overall security posture of Active Directory.

This feature allows for a deeper level of inspection within Active Directory, safeguarding against subtle yet critical security risks.

asked 13/12/2024
Benice dobbins
52 questions

Question 58

Report Export Collapse

What is the result of disjointed telemetry collection methods used within an organization?

Investigators lack granular visibility

Investigators lack granular visibility

Back of orchestration across controls

Back of orchestration across controls

False positives are seen

False positives are seen

Attacks continue to spread during investigation

Attacks continue to spread during investigation

Suggested answer: A
Explanation:

Disjointed telemetry collection within an organization can result in a lack of granular visibility for investigators. Here's why this is problematic:

Incomplete Data: Disjointed collection methods lead to fragmented data, making it difficult for security teams to get a complete picture of incidents.

Reduced Investigation Efficiency: Without granular and cohesive telemetry, investigators struggle to trace the attack's path accurately, slowing down response times.

Increased Risk of Missing Key Indicators: Critical indicators of compromise may be overlooked, allowing threats to persist or re-emerge in the environment.

Unified telemetry is essential for thorough and efficient investigations, as it provides the detailed insights necessary to understand and mitigate threats fully.

asked 13/12/2024
Koos Witkamp
36 questions

Question 59

Report Export Collapse

Which security threat stage seeks to gather valuable data and upload it to a compromised system?

Exfiltration

Exfiltration

Impact

Impact

Lateral Movement

Lateral Movement

Command and Control

Command and Control

Suggested answer: A
Explanation:

The Exfiltration stage in the threat lifecycle is when attackers attempt to gather and transfer valuable data from a compromised system to an external location under their control. This stage typically follows data discovery and involves:

Data Collection: Attackers collect sensitive information such as credentials, financial data, or intellectual property.

Data Transfer: The data is then transferred out of the organization's network to the attacker's servers, often through encrypted channels to avoid detection.

Significant Impact on Security and Privacy: Successful exfiltration can lead to substantial security and privacy violations, emphasizing the importance of detection and prevention mechanisms.

Exfiltration is a critical stage in a cyber attack, where valuable data is removed, posing a significant risk to the compromised organization.

asked 13/12/2024
Sathiyaraj Arulprakasam
52 questions

Question 60

Report Export Collapse

What does the Endpoint Communication Channel (ECC) 2.0 allow Symantec EDR to directly connect to?

SEDR Cloud Console

SEDR Cloud Console

Synapse

Synapse

SEP Endpoints

SEP Endpoints

SEPM

SEPM

Suggested answer: D
Explanation:

The Endpoint Communication Channel (ECC) 2.0 enables Symantec Endpoint Detection and Response (EDR) to establish a direct connection with the Symantec Endpoint Protection Manager (SEPM). This connection allows for:

Efficient Data Exchange: ECC 2.0 facilitates real-time communication and data exchange between SEPM and Symantec EDR.

Enhanced Endpoint Visibility: By directly connecting with SEPM, Symantec EDR can monitor endpoint activity more closely, improving threat detection and response.

Integrated Threat Management: ECC 2.0 supports coordinated efforts between SEPM and EDR, allowing for more effective containment and mitigation of threats.

This direct communication with SEPM enhances EDR's capability to manage and protect endpoints effectively.

asked 13/12/2024
Tania Trif
56 questions
Total 150 questions
Go to page: of 15