Pass the Symantec Endpoint Security 250-580 Questions and answers with CertsForce

Viewing page 5 out of 5 pages
Viewing questions 41-50 out of questions
Questions # 41:

An Application Control policy includes an Allowed list and a Blocked list. A user wants to use an application that is neither on the Allowed list nor on the Blocked list. What can the user do to gain access to the application?

Options:

A.

Email the App Control Admin


B.

Request an Override


C.

Install the application


D.

Wait for the Application Drift process to complete


Expert Solution
Questions # 42:

What does a ranged query return or exclude?

Options:

A.

Data matching the exact field names and their values


B.

Data matching a regular expression


C.

Data falling between two specified values of a given field


D.

Data based on specific values for a given field


Expert Solution
Questions # 43:

How does an administrator view all devices impacted by a suspicious file?

Options:

A.

From the Alerts and Events list, select Files; then, from the file list, select Devices.


B.

From the Discovered Items list, select Devices.


C.

From the Discovered Items list, select the file; then, from the Details page, select Devices.


D.

From the Alerts and Event list, select Device.


Expert Solution
Questions # 44:

Which Discover and Deploy process requires the LocalAccountTokenFilterPolicy value to be added to the Windows registry of endpoints, before the process begins?

Options:

A.

Push Enrollment


B.

Auto Discovery


C.

Push Discovery


D.

Device Enrollment


Expert Solution
Questions # 45:

Which statement demonstrates how Symantec EDR hunts and detects IoCs in the environment?

Options:

A.

Searching the EDR database and multiple data sources directly


B.

Viewing PowerShell processes


C.

Detecting Memory Exploits in conjunction with SEP


D.

Detonating suspicious files using cloud-based or on-premises sandboxing


Expert Solution
Viewing page 5 out of 5 pages
Viewing questions 41-50 out of questions