Broadcom 250-580 Endpoint Security Complete – R2 Technical Specialist Online Training
Broadcom 250-580 Online Training
The questions for 250-580 were last updated at Apr 05,2025.
- Exam Code: 250-580
- Exam Name: Endpoint Security Complete - R2 Technical Specialist
- Certification Provider: Broadcom
- Latest update: Apr 05,2025
How would an administrator specify which remote consoles and servers have access to the management server?
- A . Edit the Server Properties and under the General tab, change the Server Communication Permission.
- B . Edit the Communication Settings for the Group under the Clients tab.
- C . Edit the External Communication Settings for the Group under the Clients tab.
- D . Edit the Site Properties and under the General tab, change the server priority.
Which designation should an administrator assign to the computer configured to find unmanaged devices?
- A . Discovery Device
- B . Discovery Manager
- C . Discovery Agent
- D . Discovery Broker
An administrator notices that some entries list that the Risk was partially removed. The administrator
needs to determine whether additional steps are necessary to remediate the threat.
Where in the Symantec Endpoint Protection Manager console can the administrator find additional information on the risk?
- A . Risk log
- B . Computer Status report
- C . Notifications
- D . Infected and At-Risk Computers report
Which Endpoint Setting should an administrator utilize to locate unmanaged endpoints on a network subnet?
- A . Device Discovery
- B . Endpoint Enrollment
- C . Discover and Deploy
- D . Discover Endpoints
Why is it important for an Incident Responder to copy malicious files to the SEDR file store or create an image of the infected system during the Recovery phase?
- A . To create custom IPS signatures
- B . To test the effectiveness of the current assigned policy settings in the Symantec Endpoint Protection Manager (SEPM)
- C . To have a copy of the file for policy enforcement
- D . To document and preserve any pieces of evidence associated with the incident
An administrator changes the Virus and Spyware Protection policy for a specific group that disables Auto-Protect. The administrator assigns the policy and the client systems apply the corresponding policy serial number. Upon visual inspection of a physical client system, the policy serial number is correct. However, Auto-Protect is still enabled on the client system.
Which action should the administrator take to ensure that the desired setting is in place for the client?
- A . Restart the client system
- B . Run a command on the computer to Update Content
- C . Enable the padlock next to the setting in the policy
- D . Withdraw the Virus and Spyware Protection policy
In the virus and Spyware Protection policy, an administrator sets the First action to Clean risk and sets If first action fails to Delete risk.
Which two (2) factors should the administrator consider? (Select two.)
- A . The deleted file may still be in the Recycle Bin.
- B . IT Analytics may keep a copy of the file for investigation.
- C . False positives may delete legitimate files.
- D . Insight may back up the file before sending it to Symantec.
- E . A copy of the threat may still be in the quarantine.
What protection technology should an administrator enable to prevent double executable file names of ransomware variants like Cryptolocker from running?
- A . Download Insight
- B . Intrusion Prevention System
- C . SONAR
- D . Memory Exploit Mitigation
Which Indicator of Compromise might be detected as variations in the behavior of privileged users that indicate that their account is being used by someone else to gain a foothold in an environment?
- A . Mismatched Port – Application Traffic
- B . Irregularities in Privileged User Account Activity
- C . Surges in Database Read Volume
- D . Geographical Irregularities
Why is Active Directory a part of nearly every targeted attack?
- A . AD administration is managed by weak legacy APIs.
- B . AD is, by design, an easily accessed flat file name space directory database
- C . AD exposes all of its identities, applications, and resources to every endpoint in the network
- D . AD user attribution includes hidden elevated admin privileges