Pass the Symantec Endpoint Security 250-580 Questions and answers with CertsForce

Viewing page 2 out of 5 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which action does SONAR take before convicting a process?

Options:

A.

Quarantines the process


B.

Blocks suspicious behavior


C.

Restarts the system


D.

Checks the reputation of the process


Expert Solution
Questions # 12:

An administrator is investigating a possible threat that occurs during the Windows startup. A file is observed that is NOT digitally signed by Microsoft. Which Anti-malware feature should the administrator enable to scan this file for threats?

Options:

A.

Enable Early Launch Antimalware


B.

Enable Auto-Protect


C.

Enable Behavioral Analysis


D.

Enable Microsoft ELAM


Expert Solution
Questions # 13:

Why is it important for an Incident Responder to copy malicious files to the SEDR file store or create an image of the infected system during the Recovery phase?

Options:

A.

To create custom IPS signatures


B.

To test the effectiveness of the current assigned policy settings in the Symantec Endpoint ProtectionManager (SEPM)


C.

To have a copy of the file for policy enforcement


D.

To document and preserve any pieces of evidence associated with the incident


Expert Solution
Questions # 14:

Which ICDm role is required in order to use LiveShell?

Options:

A.

Security Analyst


B.

Administrator


C.

Viewer


D.

Any


Expert Solution
Questions # 15:

Which report template type should an administrator utilize to create a daily summary of network threats detected?

Options:

A.

Intrusion Prevention Report


B.

Blocked Threats Report


C.

Network Risk Report


D.

Access Violation Report


Expert Solution
Questions # 16:

An administrator selects the Discovered Items list in the ICDm to investigate a recent surge in suspicious file activity. What should an administrator do to display only high-risk files?

Options:

A.

Apply a list control.


B.

Apply a search rule


C.

Apply a search modifier


D.

Apply a list filter


Expert Solution
Questions # 17:

What characterizes an emerging threat in comparison to the traditional threat?

Options:

A.

Emerging threats are more sophisticated than traditional threats.


B.

Emerging threats require artificial intelligence to be detected.


C.

Emerging threats are undetectable by signature-based engines.


D.

Emerging threats use new techniques and 0-day vulnerability to propagate.


Expert Solution
Questions # 18:

What does an Endpoint Activity Recorder (EAR) full dump consist of?

Options:

A.

All of the recorded events that occurred on an endpoint relating to a single file


B.

All of the recorded events that occurred on an endpoint relating to a single process


C.

All of the recorded events that occurred on an endpoint


D.

All of the recorded events that are in the SEDR database


Expert Solution
Questions # 19:

From which source can an administrator retrieve the SESC Network Integrity agent for a Windows 10 S mode endpoint?

Options:

A.

SESC Installation files


B.

MDM distribution


C.

Microsoft Store


D.

ICDm package


Expert Solution
Questions # 20:

How does IPS check custom signatures?

Options:

A.

IPS checks for signatures listed in the table. When a detection matches an inbound or outbound traffic packet, the IPS engine continues checking for other signatures.


B.

IPS checks for signatures listed in the table. When a detection matches an inbound or outbound traffic packet, the IPS engine restarts checking for signatures.


C.

IPS checks for signatures listed in the table. When a detection matches an inbound or outbound traffic packet, the IPS engine stops checking other signatures.


D.

IPS checks for signatures listed in the table. When a detection matches an inbound or outbound traffic packet, the IPS engine logs the other signatures.


Expert Solution
Viewing page 2 out of 5 pages
Viewing questions 11-20 out of questions