Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

250-580 Exam Dumps - Endpoint Security Complete - R2 Technical Specialist

Go to page:
Question # 41

What protection technology should an administrator enable to prevent double executable file names of ransomware variants like Cryptolocker from running?

A.

Download Insight

B.

Intrusion Prevention System

C.

SONAR

D.

Memory Exploit Mitigation

Full Access
Question # 42

Which technique randomizes the memory address map with Memory Exploit Mitigation?

A.

ForceDEP

B.

SEHOP

C.

ASLR

D.

ROPHEAP

Full Access
Question # 43

How does IPS check custom signatures?

A.

IPS checks for signatures listed in the table. When a detection matches an inbound or outbound traffic packet, the IPS engine continues checking for other signatures.

B.

IPS checks for signatures listed in the table. When a detection matches an inbound or outbound traffic packet, the IPS engine restarts checking for signatures.

C.

IPS checks for signatures listed in the table. When a detection matches an inbound or outbound traffic packet, the IPS engine stops checking other signatures.

D.

IPS checks for signatures listed in the table. When a detection matches an inbound or outbound traffic packet, the IPS engine logs the other signatures.

Full Access
Question # 44

Which Endpoint Setting should an administrator utilize to locate unmanaged endpoints on a network subnet?

A.

Device Discovery

B.

Endpoint Enrollment

C.

Discover and Deploy

D.

Discover Endpoints

Full Access
Question # 45

What is the function of Symantec Insight?

A.

Provides reputation ratings for structured data

B.

Enhances the capability of Group Update Providers (GUP)

C.

Increases the efficiency and effectiveness of LiveUpdate

D.

Provides reputation ratings for binary executables

Full Access
Go to page: