ExamGecko
Home / Broadcom / 250-580 / List of questions
Ask Question

Broadcom 250-580 Practice Test - Questions Answers, Page 7

List of questions

Question 61

Report Export Collapse

Which communication method is utilized within SES to achieve real-time management?

Long polling

Long polling

Standard polling

Standard polling

Push Notification

Push Notification

Heartbeat

Heartbeat

Suggested answer: C
Explanation:

Push Notification is the communication method used within Symantec Endpoint Security (SES) to facilitate real-time management. This method enables:

Immediate Updates: SES can instantly push policy changes, updates, or commands to endpoints without waiting for a standard polling interval.

Efficient Response to Threats: Push notifications allow for faster reaction times to emerging threats, as instructions can be delivered to endpoints immediately.

Reduced Resource Usage: Unlike continuous polling, push notifications are triggered as needed, reducing network and system resource demands.

Push Notification is crucial for achieving real-time management in SES, providing timely responses and updates to enhance endpoint security.

asked 13/12/2024
Jessica Martinada
39 questions

Question 62

Report Export Collapse

When a SEPM is enrolled in ICDm, which policy can only be managed from the cloud?

LiveUpdate

LiveUpdate

Firewall

Firewall

Network Intrusion Prevention

Network Intrusion Prevention

Intensive Protection

Intensive Protection

Suggested answer: C
Explanation:

When Symantec Endpoint Protection Manager (SEPM) is enrolled in the Integrated Cyber Defense Manager (ICDm), the Network Intrusion Prevention policy is exclusively managed from the cloud. This setup enables:

Centralized Policy Management: By managing Network Intrusion Prevention in the cloud, ICDm ensures that policy updates and threat intelligence can be applied across all endpoints efficiently.

Real-Time Policy Updates: Cloud-based management allows immediate adjustments to intrusion prevention settings, improving responsiveness to new threats.

Consistent Security Posture: Managing Network Intrusion Prevention from the cloud ensures that all endpoints maintain a unified defense strategy against network-based attacks.

Cloud management of this policy provides flexibility and enhances security across hybrid environments.

asked 13/12/2024
Janina Loveria
47 questions

Question 63

Report Export Collapse

Using a hybrid environment, if a SEPM-managed endpoint cannot connect to the SEPM, how quickly can an administrator receive a security alert if the endpoint is using a public hot-spot?

After a VPN is activated with Network Integrity

After a VPN is activated with Network Integrity

When the client connects to SEPM

When the client connects to SEPM

At the next heartbeat

At the next heartbeat

Immediately

Immediately

Suggested answer: D
Explanation:

In a hybrid environment, if a SEPM-managed endpoint cannot connect to SEPM and is using a public hotspot, the administrator can receive a security alert immediately through ICDm (Integrated Cyber Defense Manager). Here's how:

Cloud-Based Alerts: ICDm provides real-time monitoring and alerting capabilities that are not dependent on the endpoint's direct connection to SEPM.

Network Independence: Since the endpoint connects to the cloud (ICDm), it can report events and alerts as soon as they occur, regardless of the network type or VPN status.

Enhanced Responsiveness: This setup allows administrators to respond quickly to security incidents even when endpoints are off-network, which is critical for threat containment in mobile and remote work scenarios.

ICDm's immediate alerting capability in hybrid environments enables continuous monitoring and faster response to potential security threats.

asked 13/12/2024
Tim Dekker
47 questions

Question 64

Report Export Collapse

When can an administrator add a new replication partner?

Immediately following the first LiveUpdate session of the new site

Immediately following the first LiveUpdate session of the new site

During a Symantec Endpoint Protection Manager upgrade

During a Symantec Endpoint Protection Manager upgrade

During the initial installation of the new site

During the initial installation of the new site

Immediately following a successful Active Directory sync

Immediately following a successful Active Directory sync

Suggested answer: C
Explanation:

An administrator can add a new replication partner during the initial installation of a new site in Symantec Endpoint Protection Manager (SEPM). This timing is essential because:

Initial Setup of Replication: Configuring replication during installation ensures that the new site can immediately synchronize policies, logs, and other critical data with the existing SEPM environment.

Seamless Data Consistency: Setting up replication from the beginning avoids the need for complex data merging later and ensures both sites are aligned in real time.

Configuring replication at the installation stage facilitates a smoother integration and consistent data flow between SEPM sites.

asked 13/12/2024
junjie wang
43 questions

Question 65

Report Export Collapse

Which device page should an administrator view to track the progress of an issued device command?

Command History

Command History

Activity Update

Activity Update

Command Status

Command Status

Recent Activity

Recent Activity

Suggested answer: C
Explanation:

The Command Status page is where an administrator should track the progress of issued device commands in Symantec Endpoint Security. This page provides:

Real-Time Command Updates: It shows the current status of commands, such as 'Pending,' 'Completed,' or 'Failed,' providing immediate insights into the command's execution.

Detailed Progress Tracking: Command Status logs offer details on each command, enabling the administrator to confirm that actions, such as scans, updates, or reboots, have been successfully processed by the endpoint.

The Command Status page is essential for effective device management, as it helps administrators monitor and verify the outcome of their issued commands.

asked 13/12/2024
Rolf Johannesen|
33 questions

Question 66

Report Export Collapse

Which two (2) considerations must an administrator make when enabling Application Learning in an environment? (Select two.)

Application Learning can generate increased false positives.

Application Learning can generate increased false positives.

Application Learning should be deployed on a small group of systems in the enterprise.

Application Learning should be deployed on a small group of systems in the enterprise.

Application Learning can generate significant CPU or memory use on a Symantec Endpoint Protection Manager.

Application Learning can generate significant CPU or memory use on a Symantec Endpoint Protection Manager.

Application Learning requires a file fingerprint list to be created in advance.

Application Learning requires a file fingerprint list to be created in advance.

Application Learning is dependent on Insight.

Application Learning is dependent on Insight.

Suggested answer: A, B
Explanation:

When enabling Application Learning in Symantec Endpoint Protection (SEP), an administrator should consider the following:

Increased False Positives: Application Learning may lead to increased false positives, as it identifies unfamiliar or rare applications that might not necessarily pose a threat.

Pilot Deployment Recommended: To mitigate potential disruptions, Application Learning should initially be deployed on a small subset of systems. This approach allows administrators to observe its impact, refine policies, and control the learning data gathered before extending it across the entire enterprise.

These considerations help manage the resource impact and ensure the accuracy of Application Learning.

asked 13/12/2024
Steven Owens
46 questions

Question 67

Report Export Collapse

What information is required to calculate retention rate?

Number of endpoints, EAR data per endpoint per day, available disk space, number of endpoint dumps, dump size

Number of endpoints, EAR data per endpoint per day, available disk space, number of endpoint dumps, dump size

Number of endpoints, available bandwidth, available disk space, number of endpoint dumps, dump size

Number of endpoints, available bandwidth, available disk space, number of endpoint dumps, dump size

Number of endpoints, available bandwidth, number of days to retain, number of endpoint dumps, dump size

Number of endpoints, available bandwidth, number of days to retain, number of endpoint dumps, dump size

Number of endpoints, EAR data per endpoint per day, number of days to retain, number of endpoint dumps, dump size

Number of endpoints, EAR data per endpoint per day, number of days to retain, number of endpoint dumps, dump size

Suggested answer: D
Explanation:

To calculate the retention rate in Symantec Endpoint Security (SES), the following information is required:

Number of Endpoints: Determines the total scope of data generation.

EAR Data per Endpoint per Day: This is the Endpoint Activity Recorder data size generated daily by each endpoint.

Number of Days to Retain: Defines the retention period for data storage, impacting the total data volume.

Number of Endpoint Dumps and Dump Size: These parameters contribute to overall storage needs for log data and event tracking.

This data allows administrators to accurately project storage requirements and ensure adequate capacity for data retention.

asked 13/12/2024
marius trif
51 questions

Question 68

Report Export Collapse

Which two (2) scan range options are available to an administrator for locating unmanaged endpoints? (Select two)

Entire Network

Entire Network

IP range within the network

IP range within the network

Subnet Range

Subnet Range

IP range within the subnet

IP range within the subnet

Entire Subnet

Entire Subnet

Suggested answer: B, C
Explanation:

For locating unmanaged endpoints, administrators in Symantec Endpoint Protection Manager (SEPM) can use the following scan range options:

IP Range within the Network: This option allows scanning of specific IP address ranges to locate devices that may not have SEP installed.

Subnet Range: Administrators can scan within specific subnets, providing a focused range to detect unmanaged endpoints in targeted sections of the network.

These options enable precise scans, helping administrators efficiently identify and manage unmanaged devices.

asked 13/12/2024
Mohamed Abdul Haq Mohamed Akram
52 questions

Question 69

Report Export Collapse

An organization has several Symantec Endpoint Protection Management (SEPM) Servers without access to the internet. The SEPM can only run LiveUpdate within a specified 'maintenance window' outside of business hours.

What content distribution method should the organization utilize?

JDB file

JDB file

External LiveUpdate

External LiveUpdate

Internal LiveUpdate

Internal LiveUpdate

Group Update Provider

Group Update Provider

Suggested answer: A
Explanation:

For organizations with Symantec Endpoint Protection Manager (SEPM) servers that do not have internet access and require updates only within a specific maintenance window, the JDB file method is an effective solution:

Offline Content Distribution: JDB files can be downloaded on an internet-connected device and then manually transferred to SEPM, allowing it to update content offline.

Flexible Timing: Since JDB files can be applied during the maintenance window, this method adheres to time restrictions, avoiding disruption during business hours.

Using JDB files ensures that SEPM remains updated in environments with limited connectivity or strict operational schedules.

asked 13/12/2024
Fahad Mustafa
47 questions

Question 70

Report Export Collapse

What protection technologies should an administrator enable to protect against Ransomware attacks?

Firewall, Host Integrity, System Lockdown

Firewall, Host Integrity, System Lockdown

IPS, SONAR, and Download Insight

IPS, SONAR, and Download Insight

IPS, Firewall, System Lockdown

IPS, Firewall, System Lockdown

SONAR, Firewall, Download Insight

SONAR, Firewall, Download Insight

Suggested answer: B
Explanation:

To effectively protect against Ransomware attacks, an administrator should enable the following Symantec Endpoint Protection (SEP) technologies:

IPS (Intrusion Prevention System): IPS detects and blocks network-based ransomware attacks, preventing exploitation attempts before they reach the endpoint.

SONAR (Symantec Online Network for Advanced Response): SONAR provides real-time behavioral analysis, identifying suspicious activity characteristic of ransomware, such as unauthorized file modifications.

Download Insight: This technology helps prevent ransomware by evaluating the reputation of files downloaded from the internet, blocking those with a high risk of infection.

Together, these technologies offer comprehensive protection against ransomware by covering network, behavior, and download-based threat vectors.

asked 13/12/2024
Timo Fahlenbck
38 questions
Total 150 questions
Go to page: of 15