Broadcom 250-580 Practice Test - Questions Answers, Page 7
List of questions
Question 61

Which communication method is utilized within SES to achieve real-time management?
Long polling
Standard polling
Push Notification
Heartbeat
Push Notification is the communication method used within Symantec Endpoint Security (SES) to facilitate real-time management. This method enables:
Immediate Updates: SES can instantly push policy changes, updates, or commands to endpoints without waiting for a standard polling interval.
Efficient Response to Threats: Push notifications allow for faster reaction times to emerging threats, as instructions can be delivered to endpoints immediately.
Reduced Resource Usage: Unlike continuous polling, push notifications are triggered as needed, reducing network and system resource demands.
Push Notification is crucial for achieving real-time management in SES, providing timely responses and updates to enhance endpoint security.
Question 62

When a SEPM is enrolled in ICDm, which policy can only be managed from the cloud?
LiveUpdate
Firewall
Network Intrusion Prevention
Intensive Protection
When Symantec Endpoint Protection Manager (SEPM) is enrolled in the Integrated Cyber Defense Manager (ICDm), the Network Intrusion Prevention policy is exclusively managed from the cloud. This setup enables:
Centralized Policy Management: By managing Network Intrusion Prevention in the cloud, ICDm ensures that policy updates and threat intelligence can be applied across all endpoints efficiently.
Real-Time Policy Updates: Cloud-based management allows immediate adjustments to intrusion prevention settings, improving responsiveness to new threats.
Consistent Security Posture: Managing Network Intrusion Prevention from the cloud ensures that all endpoints maintain a unified defense strategy against network-based attacks.
Cloud management of this policy provides flexibility and enhances security across hybrid environments.
Question 63

Using a hybrid environment, if a SEPM-managed endpoint cannot connect to the SEPM, how quickly can an administrator receive a security alert if the endpoint is using a public hot-spot?
After a VPN is activated with Network Integrity
When the client connects to SEPM
At the next heartbeat
Immediately
In a hybrid environment, if a SEPM-managed endpoint cannot connect to SEPM and is using a public hotspot, the administrator can receive a security alert immediately through ICDm (Integrated Cyber Defense Manager). Here's how:
Cloud-Based Alerts: ICDm provides real-time monitoring and alerting capabilities that are not dependent on the endpoint's direct connection to SEPM.
Network Independence: Since the endpoint connects to the cloud (ICDm), it can report events and alerts as soon as they occur, regardless of the network type or VPN status.
Enhanced Responsiveness: This setup allows administrators to respond quickly to security incidents even when endpoints are off-network, which is critical for threat containment in mobile and remote work scenarios.
ICDm's immediate alerting capability in hybrid environments enables continuous monitoring and faster response to potential security threats.
Question 64

When can an administrator add a new replication partner?
Immediately following the first LiveUpdate session of the new site
During a Symantec Endpoint Protection Manager upgrade
During the initial installation of the new site
Immediately following a successful Active Directory sync
An administrator can add a new replication partner during the initial installation of a new site in Symantec Endpoint Protection Manager (SEPM). This timing is essential because:
Initial Setup of Replication: Configuring replication during installation ensures that the new site can immediately synchronize policies, logs, and other critical data with the existing SEPM environment.
Seamless Data Consistency: Setting up replication from the beginning avoids the need for complex data merging later and ensures both sites are aligned in real time.
Configuring replication at the installation stage facilitates a smoother integration and consistent data flow between SEPM sites.
Question 65

Which device page should an administrator view to track the progress of an issued device command?
Command History
Activity Update
Command Status
Recent Activity
The Command Status page is where an administrator should track the progress of issued device commands in Symantec Endpoint Security. This page provides:
Real-Time Command Updates: It shows the current status of commands, such as 'Pending,' 'Completed,' or 'Failed,' providing immediate insights into the command's execution.
Detailed Progress Tracking: Command Status logs offer details on each command, enabling the administrator to confirm that actions, such as scans, updates, or reboots, have been successfully processed by the endpoint.
The Command Status page is essential for effective device management, as it helps administrators monitor and verify the outcome of their issued commands.
Question 66

Which two (2) considerations must an administrator make when enabling Application Learning in an environment? (Select two.)
Application Learning can generate increased false positives.
Application Learning should be deployed on a small group of systems in the enterprise.
Application Learning can generate significant CPU or memory use on a Symantec Endpoint Protection Manager.
Application Learning requires a file fingerprint list to be created in advance.
Application Learning is dependent on Insight.
When enabling Application Learning in Symantec Endpoint Protection (SEP), an administrator should consider the following:
Increased False Positives: Application Learning may lead to increased false positives, as it identifies unfamiliar or rare applications that might not necessarily pose a threat.
Pilot Deployment Recommended: To mitigate potential disruptions, Application Learning should initially be deployed on a small subset of systems. This approach allows administrators to observe its impact, refine policies, and control the learning data gathered before extending it across the entire enterprise.
These considerations help manage the resource impact and ensure the accuracy of Application Learning.
Question 67

What information is required to calculate retention rate?
Number of endpoints, EAR data per endpoint per day, available disk space, number of endpoint dumps, dump size
Number of endpoints, available bandwidth, available disk space, number of endpoint dumps, dump size
Number of endpoints, available bandwidth, number of days to retain, number of endpoint dumps, dump size
Number of endpoints, EAR data per endpoint per day, number of days to retain, number of endpoint dumps, dump size
To calculate the retention rate in Symantec Endpoint Security (SES), the following information is required:
Number of Endpoints: Determines the total scope of data generation.
EAR Data per Endpoint per Day: This is the Endpoint Activity Recorder data size generated daily by each endpoint.
Number of Days to Retain: Defines the retention period for data storage, impacting the total data volume.
Number of Endpoint Dumps and Dump Size: These parameters contribute to overall storage needs for log data and event tracking.
This data allows administrators to accurately project storage requirements and ensure adequate capacity for data retention.
Question 68

Which two (2) scan range options are available to an administrator for locating unmanaged endpoints? (Select two)
Entire Network
IP range within the network
Subnet Range
IP range within the subnet
Entire Subnet
For locating unmanaged endpoints, administrators in Symantec Endpoint Protection Manager (SEPM) can use the following scan range options:
IP Range within the Network: This option allows scanning of specific IP address ranges to locate devices that may not have SEP installed.
Subnet Range: Administrators can scan within specific subnets, providing a focused range to detect unmanaged endpoints in targeted sections of the network.
These options enable precise scans, helping administrators efficiently identify and manage unmanaged devices.
Question 69

An organization has several Symantec Endpoint Protection Management (SEPM) Servers without access to the internet. The SEPM can only run LiveUpdate within a specified 'maintenance window' outside of business hours.
What content distribution method should the organization utilize?
JDB file
External LiveUpdate
Internal LiveUpdate
Group Update Provider
For organizations with Symantec Endpoint Protection Manager (SEPM) servers that do not have internet access and require updates only within a specific maintenance window, the JDB file method is an effective solution:
Offline Content Distribution: JDB files can be downloaded on an internet-connected device and then manually transferred to SEPM, allowing it to update content offline.
Flexible Timing: Since JDB files can be applied during the maintenance window, this method adheres to time restrictions, avoiding disruption during business hours.
Using JDB files ensures that SEPM remains updated in environments with limited connectivity or strict operational schedules.
Question 70

What protection technologies should an administrator enable to protect against Ransomware attacks?
Firewall, Host Integrity, System Lockdown
IPS, SONAR, and Download Insight
IPS, Firewall, System Lockdown
SONAR, Firewall, Download Insight
To effectively protect against Ransomware attacks, an administrator should enable the following Symantec Endpoint Protection (SEP) technologies:
IPS (Intrusion Prevention System): IPS detects and blocks network-based ransomware attacks, preventing exploitation attempts before they reach the endpoint.
SONAR (Symantec Online Network for Advanced Response): SONAR provides real-time behavioral analysis, identifying suspicious activity characteristic of ransomware, such as unauthorized file modifications.
Download Insight: This technology helps prevent ransomware by evaluating the reputation of files downloaded from the internet, blocking those with a high risk of infection.
Together, these technologies offer comprehensive protection against ransomware by covering network, behavior, and download-based threat vectors.
Question