Broadcom 250-586 Endpoint Security Complete Implementation – Technical Specialist Online Training
Broadcom 250-586 Online Training
The questions for 250-586 were last updated at Apr 05,2025.
- Exam Code: 250-586
- Exam Name: Endpoint Security Complete Implementation - Technical Specialist
- Certification Provider: Broadcom
- Latest update: Apr 05,2025
What permissions does the Security Analyst Role have?
- A . Search endpoints, trigger dumps, create policies
- B . Trigger dumps, get and quarantine files, enroll new sites
- C . Search endpoints, trigger dumps, get and quarantine files
- D . Trigger dumps, get and quarantine files, create device groups
What is the purpose of the Test Plan in the implementation phase?
- A . To assess the SESC Solution Design in the customer’s environment
- B . To monitor the Implementation of SES Complete
- C . To guide the adoption and testing of SES Complete in the implementation phase
- D . To seek approval for the next phase of the SESC Implementation Framework
What is the focus of Active Directory Defense testing in the Test Plan?
- A . Validating the Obfuscation Factor for AD Domain Settings
- B . Testing the intensity level for Malware Prevention
- C . Ensuring that Application Launch Rules are blocking or allowing application execution and behaviors on endpoints
- D . Validating the protection against network threats for Network Integrity Configuration
What should be documented in the Infrastructure Design section to enable traffic redirection to Symantec servers?
- A . Required ports and protocols
- B . Hardware recommendations
- C . Site Topology description
- D . Disaster recovery plan
Which policy should an administrator edit to utilize the Symantec LiveUpdate server for pre-release content?
- A . The System Policy
- B . The LiveUpdate Policy
- C . The System Schedule Policy
- D . The Firewall Policy
What is purpose of the Solution Configuration Design in the Implement phase?
- A . To provide a brief functional overview of the component placement in the environment
- B . To outline the hardware requirements for on-premise components
- C . To guide the implementation of features and functions
- D . To detail the storage estimates and hardware configuration
What is the recommended setup to ensure clients automatically fallback to their Priority 1 server(s) in case of a faulty SEP Manager?
- A . Configure all SEP Managers with equal priority
- B . Configure all SEP Managers with different priorities
- C . Do not configure any priority for SEP Managers
- D . Use a separate fallback server
Where can you submit evidence of malware not detected by Symantec products?
- A . SymProtect Cases Page
- B . Virus Definitions and Security Update Page
- C . SymSubmit Page
- D . Symantec Vulnerability Response page
What is the primary purpose of the Pilot Deployment in the Implementation phase?
- A . To validate the effectiveness of the solution design in the customer’s environment
- B . To ensure that the communication paths between major components have been established
- C . To ensure that any potential outstanding activities and tasks are assigned to the right people
- D . To ensure that all accounts are set with their allocated permissions and assignments
Which two options are available when configuring DNS change detected for SONAR? (Select two.)
- A . Block
- B . Active Response
- C . Quarantine
- D . Log
- E . Trace