Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Symantec Endpoint Security 250-580 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam 250-580 Premium Access

View all detail and faqs for the 250-580 exam


504 Students Passed

97% Average Score

91% Same Questions
Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which SEP feature is required for using the SEDR Isolate function?

Options:

A.

Host Isolation Policy

B.

Application Control

C.

Host Integrity Policy

D.

Application Detection

Questions # 2:

Which default role has the most limited permission in the Integrated Cyber Defense Manager?

Options:

A.

Endpoint Console Domain Administrator

B.

Server Administrator

C.

Restricted Administrator

D.

Limited Administrator

Questions # 3:

After several failed logon attempts, the Symantec Endpoint Protection Manager (SEPM) has locked the default admin account. An administrator needs to make system changes as soon as possible to address an outbreak, but the admin account is the only account.

Which action should the administrator take to correct the problem with minimal impact on the existing environment?

Options:

A.

Wait 15 minutes and attempt to log on again

B.

Restore the SEPM from a backup

C.

Run the Management Server and Configuration Wizard to reconfigure the server

D.

Reinstall the SEPM

Questions # 4:

Administrators at a company share a single terminal for configuring Symantec Endpoint Protection. The administrators want to ensure that each administrator using the console is forced to authenticate using their individual credentials. They are concerned that administrators may forget to log off the terminal, which would easily allow others to gain access to the Symantec Endpoint Protection Manager (SEPM) console.

Which setting should the administrator disable to minimize the risk of non-authorized users logging into the SEPM console?

Options:

A.

Allow users to save credentials when logging on

B.

Delete clients that have not connected for specified time

C.

Lock account after the specified number of unsuccessful logon attempts

D.

Allow administrators to reset passwords

Questions # 5:

What is the difference between running Device Control for a Mac versus Windows?

Options:

A.

Mac Device Control runs at thedriver level.It enforces control only on Apple supported devices.

B.

Mac Device Control runs at thevolume level.It enforces control only on storage devices. OC.Mac Device Control runs at thekernel level.It enforces control only on built-in devices.

C.

Mac Device Control runs at theuser level.It enforces control only on iCIoud storage.

Questions # 6:

Which ICDm role is required in order to use LiveShell?

Options:

A.

Security Analyst

B.

Administrator

C.

Viewer

D.

Any

Questions # 7:

What does an end-user receive when an administrator utilizes the Invite User feature to distribute the SES client?

Options:

A.

An email with the SES_setup.zip file attached

B.

An email with a link to register on the ICDm user portal

C.

An email with a link to directly download the SES client

D.

An email with a link to a KB article explaining how to install the SES Agent

Questions # 8:

An administrator needs to increase the access speed for client files that are stored on a file server. Which configuration should the administrator review to address the read speed from the server?

Options:

A.

Enable Network Cache in the client's Virus and Spyware Protection policy

B.

Add the applicable server to a trusted host group

C.

Create a Firewall allow rule for the server's IP address.

D.

Enable download randomization in the client group's communication settings

Questions # 9:

What methods should an administrator utilize to restore communication on a client running SEP for Mac?

Options:

A.

Use Client Deployment Wizard to push out a communications package.

B.

Use the Sylink Drop Tool on the SEPM.

C.

Use SSH and run the command:

D.

sudo launchct1 load /Library/LaunchDaemons/eom.Symantec.symdaemon.'plist

E.

Use Third Party Deployment to push out a communications package.

Questions # 10:

What happens when a device fails a Host Integrity check?

Options:

A.

An antimalware scan is initiated

B.

The device is restarted

C.

The device is quarantined

D.

An administrative notification is logged

Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.