Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

250-580 Exam Dumps - Endpoint Security Complete - R2 Technical Specialist

Go to page:
Question # 25

In what order should an administrator configure the integration between SEDR and Symantec Endpoint Protection in order to maximize their benefits?

A.

Synapse, ECC, then Insight Proxy

B.

ECC, Synapse, then Insight Proxy

C.

Insight Proxy, Synapse, then ECC

D.

ECC, Insight Proxy, then Synapse

Full Access
Question # 26

What permissions does the Security Analyst Role have?

A.

Trigger dumps, get & quarantine files, enroll new sites

B.

Search endpoints, trigger dumps, get & quarantine files

C.

Trigger dumps, get & quarantine files, create device groups

D.

Search endpoints, trigger dumps, create policies

Full Access
Question # 27

An organization identifies a threat in its environment and needs to limit the spread of the threat. How should the SEP Administrator block the threat using Application and Device Control?

A.

Gather the MD5 hash of the file and create an Application Content Rule that blocks the file based on the file fingerprint.

B.

Gather the process name of the file and create an Application Content Rule that blocks the file based on the device ID type.

C.

Gather the MD5 hash of the file and create an Application Content Rule that uses regular expression matching.

D.

Gather the MD5 hash of the file and create an Application Content Rule that blocks the file based on specific arguments.

Full Access
Question # 28

Which rule types should be at the bottom of the list when an administrator adds device control rules?

A.

Specific "device type" rules

B.

Specific "device model" rules

C.

General "catch all" rules

D.

General "brand defined" rules

Full Access
Question # 29

What must be entered before downloading a file from ICDm?

A.

Name

B.

Password

C.

Hash

D.

Date

Full Access
Question # 30

Why is it important for an Incident Responder to copy malicious files to the SEDR file store or create an image of the infected system during the Recovery phase?

A.

To create custom IPS signatures

B.

To test the effectiveness of the current assigned policy settings in the Symantec Endpoint ProtectionManager (SEPM)

C.

To have a copy of the file for policy enforcement

D.

To document and preserve any pieces of evidence associated with the incident

Full Access
Question # 31

The LiveUpdate Download Schedule is set to the default on the Symantec Endpoint Protection Manager (SEPM).

How many content revisions must the SEPM keep to ensure clients that check in to the SEPM every 10 days receive xdelta content packages instead of full content packages?

A.

10

B.

20

C.

30

D.

60

Full Access
Question # 32

The SES Intrusion Prevention System has blocked an intruder's attempt to establish an IRC connection inside the firewall. Which Advanced Firewall Protection setting should an administrator enable to prevent the intruder's system from communicating with the network after the IPS detection?

A.

Enable port scan detection

B.

Automatically block an attacker's IP address

C.

Block all traffic until the firewall starts and after the firewall stops

D.

Enable denial of service detection

Full Access
Go to page: