250-580 Endpoint Security Complete - R2 Technical Specialist Questions and Answers
The SES Intrusion Prevention System has blocked an intruder's attempt to establish an IRC connection inside the firewall. Which Advanced Firewall Protection setting should an administrator enable to prevent the intruder's system from communicating with the network after the IPS detection?
What type of Threat Defense for Active Directory alarms are displayed after domain misconfigurations or hidden backdoors are detected?
Which report template type should an administrator utilize to create a daily summary of network threats detected?
An organization recently experienced an outbreak and is conducting a health check of the environment. What Protection Technology can the SEP team enable to control and monitor the behavior of applications?
An administrator needs to identify infected computers that require a restart to finish remediation of a threat. What steps in the SEPM should an administrator perform to identify and restart the systems?
Which two (2) considerations must an administrator make when enabling Application Learning in an environment? (Select two.)
Which IPS signature type is primarily used to identify specific unwanted network traffic?
Which communication method is utilized within SES to achieve real-time management?
Which Discover and Deploy process requires the LocalAccountTokenFilterPolicy value to be added to the Windows registry of endpoints, before the process begins?
Which of the following is a benefit of choosing a hybrid SES Complete architecture?
Why is it important for an Incident Responder to copy malicious files to the SEDR file store or create an image of the infected system during the Recovery phase?
From which source can an administrator retrieve the SESC Network Integrity agent for a Windows 10 S mode endpoint?
Why is it important for an Incident Responder to search for suspicious registry and system file changes when threat hunting?
Files are blocked by hash in the deny list policy. Which algorithm is supported, in addition to MD5?
What are the two (2) locations where an Incident Responder should gather data for an After Actions Report in SEDR? (Select two)
Which term or expression is utilized when adversaries leverage existing tools in the environment?
Which action can an administrator take to improve the Symantec Endpoint Protection Manager (SEPM) dashboard performance and report accuracy?
What feature is used to get a comprehensive picture of infected endpoint activity?
Which two (2) criteria are used by Symantec Insight to evaluate binary executables? (Select two.)
An organization is considering a single site for their Symantec Endpoint Protection environment. What are two (2) reasons that the organization should consider? (Select two)
Which SES advanced feature detects malware by consulting a training model composed of known good and known bad files?
A company allows users to create firewall rules. During the course of business, users are accidentally adding rules that block a custom internal application.
Which steps should the Symantec Endpoint Protection administrator take to prevent users from blocking the custom application?
Which Incident View widget shows the parent-child relationship of related security events?
Which SES feature helps to ensure that devices are compliant with a company's security standards?
Which statement demonstrates how Symantec EDR hunts and detects IoCs in the environment?
What priority would an incident that may have an impact on business be considered?
Administrators at a company share a single terminal for configuring Symantec Endpoint Protection. The administrators want to ensure that each administrator using the console is forced to authenticate using their individual credentials. They are concerned that administrators may forget to log off the terminal, which would easily allow others to gain access to the Symantec Endpoint Protection Manager (SEPM) console.
Which setting should the administrator disable to minimize the risk of non-authorized users logging into the SEPM console?
Which type of security threat continues to threaten endpoint security after a system reboot?
An organization has several Symantec Endpoint Protection Management (SEPM) Servers without access to the internet. The SEPM can only run LiveUpdate within a specified "maintenance window" outside of business hours.
What content distribution method should the organization utilize?
What does the Endpoint Communication Channel (ECC) 2.0 allow Symantec EDR to directly connect to?
Which client log shows that a client is downloading content from its designated source?
What is the difference between running Device Control for a Mac versus Windows?
Which antimalware intensity level is defined by the following: "Blocks files that are most certainly bad or potentially bad files results in a comparable number of false positives and false negatives."
Which SES feature helps administrators apply policies based on specific endpoint profiles?
