Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

250-580 Exam Dumps - Endpoint Security Complete - R2 Technical Specialist

Go to page:
Question # 33

Which term or expression is utilized when adversaries leverage existing tools in the environment?

A.

opportunistic attack

B.

file-less attack

C.

script kiddies

D.

living off the land

Full Access
Question # 34

What is an appropriate use of a file fingerprint list?

A.

Allow unknown files to be downloaded with Insight

B.

Prevent programs from running

C.

Prevent Antivirus from scanning a file

D.

Allow files to bypass Intrusion Prevention detection

Full Access
Question # 35

What EDR feature provides endpoint activity recorder data for a file hash?

A.

Process Dump

B.

Entity Dump

C.

Hash Dump

D.

Full Dump

Full Access
Question # 36

What does a ranged query return or exclude?

A.

Data matching the exact field names and their values

B.

Data matching a regular expression

C.

Data falling between two specified values of a given field

D.

Data based on specific values for a given field

Full Access
Question # 37

On which platform is LiveShell available?

A.

Windows

B.

All

C.

Linux

D.

Mac

Full Access
Question # 38

How are Insight results stored?

A.

Encrypted on the Symantec Endpoint Protection Manager

B.

Unencrypted on the Symantec Endpoint Protection Manager

C.

Encrypted on the Symantec Endpoint Protection client

D.

Unencrypted on the Symantec Endpoint Protection client

Full Access
Question # 39

What protection technologies should an administrator enable to protect against Ransomware attacks?

A.

Firewall, Host Integrity, System Lockdown

B.

IPS, SONAR, and Download Insight

C.

IPS, Firewall, System Lockdown

D.

SONAR, Firewall, Download Insight

Full Access
Question # 40

What is an appropriate use of a file fingerprint list?

A.

Allow unknown files to be downloaded with Insight

B.

Prevent programs from running

C.

Prevent Antivirus from scanning a file

D.

Allow files to bypass Intrusion Prevention detection

Full Access
Go to page: