Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

250-580 Exam Dumps - Endpoint Security Complete - R2 Technical Specialist

Go to page:
Question # 9

An administrator is troubleshooting a Symantec Endpoint Protection (SEP) replication.

Which component log should the administrator check to determine whether the communication between the two sites is working correctly?

A.

Apache Web Server

B.

Tomcat

C.

SQL Server

D.

Group Update Provider (GUP)

Full Access
Question # 10

What happens when an administrator adds a file to the deny list?

A.

The file is assigned to a chosen Deny List policy

B.

The file is assigned to the Deny List task list

C.

The file is automatically quarantined

D.

The file is assigned to the default Deny List policy

Full Access
Question # 11

Which Indicator of Compromise might be detected as variations in the behavior of privileged users that indicate that their account is being used by someone else to gain a foothold in an environment?

A.

Mismatched Port - Application Traffic

B.

Irregularities in Privileged User Account Activity

C.

Surges in Database Read Volume

D.

Geographical Irregularities

Full Access
Question # 12

Which statement demonstrates how Symantec EDR hunts and detects IoCs in the environment?

A.

Searching the EDR database and multiple data sources directly

B.

Viewing PowerShell processes

C.

Detecting Memory Exploits in conjunction with SEP

D.

Detonating suspicious files using cloud-based or on-premises sandboxing

Full Access
Question # 13

What should an administrator know regarding the differences between a Domain and a Tenant in ICDm?

A.

A tenant can contain multiple domains

B.

Each customer can have one domain and many tenants

C.

A domain can contain multiple tenants

D.

Each customer can have one tenant and no domains

Full Access
Question # 14

What happens when a device fails a Host Integrity check?

A.

An antimalware scan is initiated

B.

The device is restarted

C.

The device is quarantined

D.

An administrative notification is logged

Full Access
Question # 15

When a SEPM is enrolled in ICDm, which policy can only be managed from the cloud?

A.

LiveUpdate

B.

Firewall

C.

Network Intrusion Prevention

D.

Intensive Protection

Full Access
Question # 16

An organization is considering a single site for their Symantec Endpoint Protection environment. What are two (2) reasons that the organization should consider? (Select two)

A.

Organizational merger

B.

Sufficient WAN bandwidth

C.

Delay-free, centralized reporting

D.

24x7 admin availability

E.

E.Legal constraints

Full Access
Go to page: