Broadcom 250-580 Endpoint Security Complete – R2 Technical Specialist Online Training
Broadcom 250-580 Online Training
The questions for 250-580 were last updated at Mar 30,2025.
- Exam Code: 250-580
- Exam Name: Endpoint Security Complete - R2 Technical Specialist
- Certification Provider: Broadcom
- Latest update: Mar 30,2025
What EDR function minimizes the risk of an endpoint infecting other resources in the environment?
- A . Quarantine
- B . Block
- C . Deny List
- D . Firewall
What priority would an incident that may have an impact on business be considered?
- A . Low
- B . Critical
- C . High
- D . Medium
Which antimalware intensity level is defined by the following: "Blocks files that are most certainly bad or potentially bad files results in a comparable number of false positives and false negatives."
- A . Level 6
- B . Level 5
- C . Level 2
- D . Level 1
The SES Intrusion Prevention System has blocked an intruder’s attempt to establish an IRC connection inside the firewall.
Which Advanced Firewall Protection setting should an administrator enable to prevent the intruder’s system from communicating with the network after the IPS detection?
- A . Enable port scan detection
- B . Automatically block an attacker’s IP address
- C . Block all traffic until the firewall starts and after the firewall stops
- D . Enable denial of service detection
After several failed logon attempts, the Symantec Endpoint Protection Manager (SEPM) has locked the default admin account. An administrator needs to make system changes as soon as possible to address an outbreak, but the admin account is the only account.
Which action should the administrator take to correct the problem with minimal impact on the existing environment?
- A . Wait 15 minutes and attempt to log on again
- B . Restore the SEPM from a backup
- C . Run the Management Server and Configuration Wizard to reconfigure the server
- D . Reinstall the SEPM
Which Incident View widget shows the parent-child relationship of related security events?
- A . The Incident Summary Widget
- B . The Process Lineage Widget
- C . The Events Widget
- D . The Incident Graph Widget
Which Symantec Endpoint Protection technology blocks a downloaded program from installing browser plugins?
- A . Intrusion Prevention
- B . SONAR
- C . Application and Device Control
- D . Tamper Protection
Which type of event does operation:1 indicate in a SEDR database search?
- A . File Deleted.
- B . File Closed.
- C . File Open.
- D . File Created.
An Incident Responder has determined that an endpoint is compromised by a malicious threat.
What SEDR feature would be utilized first to contain the threat?
- A . File Deletion
- B . Incident Manager
- C . Isolation
- D . Endpoint Activity Recorder
If an administrator enables the setting to manage policies from the cloud, what steps must be taken to reverse this process?
- A . Navigate to ICDm > Enrollment and disable the setting
- B . Unenroll the SEPM > Disable the setting > Re-enroll the SEPM
- C . Revoke policies from ICDm
- D . Revoke policies from SEPM