Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

250-580 Exam Dumps - Endpoint Security Complete - R2 Technical Specialist

Go to page:
Question # 17

When are events generated within SEDR?

A.

When an incident is selected

B.

When an activityoccurs

C.

When any event is opened

D.

When entities are viewed

Full Access
Question # 18

What Symantec Best Practice is recommended when setting up Active Directory integration with the Symantec Endpoint Protection Manager?

A.

Ensure there is more than one Active Directory Server listed in the Server Properties.

B.

Link the built-in Admin account to an Active Directory account.

C.

Import the existing AD structure to organize clients in user mode.

D.

Secure the management console by denying access to certain computers.

Full Access
Question # 19

Files are blocked by hash in the deny list policy. Which algorithm is supported, in addition to MD5?

A.

SHA2

B.

SHA256

C.

SHA256 "salted"

D.

MD5 "Salted"

Full Access
Question # 20

An organization would like to use a content distribution method that centrally controls content types and versions. Almost all of their endpoints are running Windows.

What type of content distribution method should be used?

A.

Management Server

B.

Group Update Provider

C.

Internal LiveUpdate Server

D.

External LiveUpdate Server

Full Access
Question # 21

What does a ranged query return or exclude?

A.

Data matching the exact field names and their values

B.

Data matching a regular expression

C.

Data falling between two specified values of a given field

D.

Data based on specific values for a given field

Full Access
Question # 22

Which rule types should be at the bottom of the list when an administrator adds device control rules?

A.

Specific "device type" rules

B.

Specific "device model" rules

C.

General "catch all" rules

D.

General "brand defined" rules

Full Access
Question # 23

How would an administrator specify which remote consoles and servers have access to the management server?

A.

Edit theServer Propertiesand under theGeneral tab,change theServer Communication Permission.

B.

Edit theCommunication Settingsfor the Group under theClients tab.

C.

EdittheExternal Communication Settingsfor the Group under theClients tab.

D.

Edit theSite Propertiesand under theGeneral tab,change the server priority.

Full Access
Question # 24

What feature is used to get a comprehensive picture of infected endpoint activity?

A.

Entity View

B.

Process View

C.

Full Dump

D.

Endpoint Dump

Full Access
Go to page: