ExamGecko
Home / Broadcom / 250-580 / List of questions
Ask Question

Broadcom 250-580 Practice Test - Questions Answers, Page 8

Add to Whishlist

List of questions

Question 71

Report Export Collapse

Which of the following is a benefit of choosing a hybrid SES Complete architecture?

Become a Premium Member for full access
  Unlock Premium Member

Question 72

Report Export Collapse

An organization runs a weekly backup using the Backup and Restore Wizard. This week, the process failed to complete due to low disk space.

How does the SEP Administrator change the SEPM backup file location?

Become a Premium Member for full access
  Unlock Premium Member

Question 73

Report Export Collapse

An administrator needs to add an Application Exception. When the administrator accesses the Application Exception dialog window, applications fail to appear.

What is the likely problem?

Become a Premium Member for full access
  Unlock Premium Member

Question 74

Report Export Collapse

How does Memory Exploit Mitigation protect applications?

Become a Premium Member for full access
  Unlock Premium Member

Question 75

Report Export Collapse

In which phase of the MITRE framework would attackers exploit faults in software to directly tamper with system memory?

Become a Premium Member for full access
  Unlock Premium Member

Question 76

Report Export Collapse

What prevention technique does Threat Defense for Active Directory use to expose attackers?

Become a Premium Member for full access
  Unlock Premium Member

Question 77

Report Export Collapse

What version number is assigned to a duplicated policy?

Become a Premium Member for full access
  Unlock Premium Member

Question 78

Report Export Collapse

How should an administrator set up an alert to be notified when manual remediation is needed on an endpoint?

Become a Premium Member for full access
  Unlock Premium Member

Question 79

Report Export Collapse

An administrator is investigating a possible threat that occurs during the Windows startup. A file is observed that is NOT digitally signed by Microsoft. Which Anti-malware feature should the administrator enable to scan this file for threats?

Become a Premium Member for full access
  Unlock Premium Member

Question 80

Report Export Collapse

A company uses a remote administration tool that is detected as Hacktool.KeyLoggPro and quarantined by Symantec Endpoint Protection (SEP).

Which step can an administrator perform to continue using the remote administration tool without detection by SEP?

Become a Premium Member for full access
  Unlock Premium Member
Total 150 questions
Go to page: of 15