ExamGecko
Home / Broadcom / 250-580 / List of questions
Ask Question

Broadcom 250-580 Practice Test - Questions Answers, Page 7

Add to Whishlist

List of questions

Question 61

Report Export Collapse

Which communication method is utilized within SES to achieve real-time management?

Become a Premium Member for full access
  Unlock Premium Member

Question 62

Report Export Collapse

When a SEPM is enrolled in ICDm, which policy can only be managed from the cloud?

Become a Premium Member for full access
  Unlock Premium Member

Question 63

Report Export Collapse

Using a hybrid environment, if a SEPM-managed endpoint cannot connect to the SEPM, how quickly can an administrator receive a security alert if the endpoint is using a public hot-spot?

Become a Premium Member for full access
  Unlock Premium Member

Question 64

Report Export Collapse

When can an administrator add a new replication partner?

Become a Premium Member for full access
  Unlock Premium Member

Question 65

Report Export Collapse

Which device page should an administrator view to track the progress of an issued device command?

Become a Premium Member for full access
  Unlock Premium Member

Question 66

Report Export Collapse

Which two (2) considerations must an administrator make when enabling Application Learning in an environment? (Select two.)

Become a Premium Member for full access
  Unlock Premium Member

Question 67

Report Export Collapse

What information is required to calculate retention rate?

Become a Premium Member for full access
  Unlock Premium Member

Question 68

Report Export Collapse

Which two (2) scan range options are available to an administrator for locating unmanaged endpoints? (Select two)

Become a Premium Member for full access
  Unlock Premium Member

Question 69

Report Export Collapse

An organization has several Symantec Endpoint Protection Management (SEPM) Servers without access to the internet. The SEPM can only run LiveUpdate within a specified 'maintenance window' outside of business hours.

What content distribution method should the organization utilize?

Become a Premium Member for full access
  Unlock Premium Member

Question 70

Report Export Collapse

What protection technologies should an administrator enable to protect against Ransomware attacks?

Become a Premium Member for full access
  Unlock Premium Member
Total 150 questions
Go to page: of 15