Symantec 250-550 Administration of Symantec Endpoint Security – R1 Online Training
Symantec 250-550 Online Training
The questions for 250-550 were last updated at Nov 19,2024.
- Exam Code: 250-550
- Exam Name: Administration of Symantec Endpoint Security – R1
- Certification Provider: Symantec
- Latest update: Nov 19,2024
Which default role has the most limited permission in the Integrated Cyber Defense Manager?
- A . Restricted Administrator
- B . Limited Administrator
- C . Server Administrator
- D . Endpoint Console Domain Administrator
What must an administrator check prior to enrolling an on-prem SEPM infrastructure into the cloud?
- A . Clients are running SEP 14.2 or later
- B . Clients are running SEP 14.1.0 or later
- C . Clients are running SEP 12-6 or later
- D . Clients are running SEP 14.0.1 or late
What are the Exploit Mitigation security control’s mitigation techniques designed to prevent?
- A . Packed file execution
- B . Misbehaving applications
- C . File-less attacks
- D . Rootkit downloads
Which two (2) skill areas are critical to the success of incident Response Teams (Select two)
- A . Project Management
- B . Incident Management
- C . Cyber Intelligence
- D . Incident Response
- E . Threat Analysis
Which security threat uses malicious code to destroy evidence, break systems, or encrypt data?
- A . Execution
- B . Persistence
- C . Impact
- D . Discovery
Which framework, open and available to any administrator, is utilized to categorize adversarial tactics and for each phase of a cyber attack?
- A . MITRE RESPONSE
- B . MITRE ATT&CK
- C . MITRE ADV&NCE
- D . MITRE ATTACK MATRIX
Which SES security control protects against threats that may occur in the Impact phase?
- A . Device Control
- B . IPS
- C . Antimalware
- D . Firewall
Which Endpoint > Setting should an administrator utilize to locate unmanaged endpoints on a network subnet?
- A . Discover Endpoints
- B . Endpoint Enrollment
- C . Discover and Deploy
- D . Device Discovery
An administrator needs to create a new Report Template that will be used to track firewall activity .
Which two (2) report template settings are optional? (Select 2)
- A . Output format
- B . Generation schedule
- C . Email recipients
- D . Time frame
- E . Size restrictions
Which two (2) scan range options are available to an administrator for locating unmanaged endpoints? (Select two)
- A . IP range within network
- B . IP range within subnet
- C . Entire Network
- D . Entire Subnet
- E . Subnet Range