Pass the Symantec Endpoint Security 250-580 Questions and answers with CertsForce

Viewing page 4 out of 5 pages
Viewing questions 31-40 out of questions
Questions # 31:

What tool can administrators use to create custom behavioral isolation policies based on collected application behavior data?

Options:

A.

Behavioral Prevalence Check


B.

Behavioral Heat Map


C.

Application Catalog


D.

Application Frequency Map


Expert Solution
Questions # 32:

What EDR feature provides endpoint activity recorder data for a file hash?

Options:

A.

Process Dump


B.

Entity Dump


C.

Hash Dump


D.

Full Dump


Expert Solution
Questions # 33:

When a SEPM is enrolled in ICDm, which policy can only be managed from the cloud?

Options:

A.

LiveUpdate


B.

Firewall


C.

Network Intrusion Prevention


D.

Intensive Protection


Expert Solution
Questions # 34:

A Symantec Endpoint Protection (SEP) administrator receives multiple reports that machines are experiencing performance issues. The administrator discovers that the reports happen at about the same time as the scheduled LiveUpdate.

Which setting should the SEP administrator configure to minimize I/O when LiveUpdate occurs?

Options:

A.

Change the LiveUpdate schedule


B.

Change the Administrator-defined scan schedule


C.

Disable Allow user-defined scans to run when the scan author is logged off


D.

Disable Run an Active Scan when new definitions arrive


Expert Solution
Questions # 35:

How does Memory Exploit Mitigation protect applications?

Options:

A.

Injects a DLL(IPSEng32.dllorIPSEng64.dll)into protected processes and when an exploit attempt is detected, terminates the protected process to prevent the malicious code from running.


B.

Injects a DLL(UMEngx86.dll)into applications that run in user mode and if the application behaves maliciously, then SEP detects it.


C.

Injects a DLL (sysfer.dll) into processes being launched on the machine and if the process isn't trusted, prevents the process from running.


D.

Injects a DLL(IPSEng32.dll)into browser processes and protects the machine from drive-by downloads.


Expert Solution
Questions # 36:

An administrator needs to identify infected computers that require a restart to finish remediation of a threat. What steps in the SEPM should an administrator perform to identify and restart the systems?

Options:

A.

View the Computer Status log to determine if any computers require a restart. Run a command from the Risk log to restart computers.


B.

View the SONAR log to determine if any computers require a restart. Run a command from the Computer Status log to restart computers.


C.

View the Computer Status log to determine if any computers require a restart. Run a command from the SONAR log to restart computers.


D.

View the Computer Status log to determine if any computers require a restart. Run a command from the Attack log to restart computers.


Expert Solution
Questions # 37:

Which of the following is a benefit of choosing a hybrid SES Complete architecture?

Options:

A.

The ability to use the cloud EDR functionality


B.

The ability to manage legacy clients running an embedded OS


C.

The ability to manage Active Directory group structure without Azure


D.

The ability to use Adaptive Protection features


Expert Solution
Questions # 38:

Which action must a Symantec Endpoint Protection administrator take before creating custom Intrusion Prevention signatures?

Options:

A.

Change the custom signature order


B.

Create a Custom Intrusion Prevention Signature library


C.

Define signature variables


D.

Enable signature logging


Expert Solution
Questions # 39:

What information is required to calculate retention rate?

Options:

A.

Number of endpoints, EAR data per endpoint per day, available disk space, number of endpoint dumps, dump size


B.

Number of endpoints, available bandwidth, available disk space, number of endpoint dumps, dump size


C.

Number of endpoints, available bandwidth, number of days to retain, number of endpoint dumps, dump size


D.

Number of endpoints, EAR data per endpoint per day, number of days to retain, number of endpoint dumps, dump size


Expert Solution
Questions # 40:

Which security threat stage seeks to gather valuable data and upload it to a compromised system?

Options:

A.

Exfiltration


B.

Impact


C.

Lateral Movement


D.

Command and Control


Expert Solution
Viewing page 4 out of 5 pages
Viewing questions 31-40 out of questions