Broadcom 250-580 Exam
Endpoint Security Complete - R2 Technical Specialist (Page 14 )

Updated On: 9-Feb-2026

Which technology can prevent an unknown executable from being downloaded through a browser session?

  1. Intrusion Prevention
  2. Insight
  3. Application Control
  4. Advanced Machine Learning

Answer(s): B

Explanation:

Symantec Insight technology can prevent the download of unknown executables through a browser session by leveraging a cloud-based reputation service. Insight assesses the reputation of files based on data collected from millions of endpoints, blocking downloads that are unknown or have a low reputation. This technology is particularly effective against zero-day threats or unknown files that do not yet have established signatures.



What should an administrator know regarding the differences between a Domain and a Tenant in ICDm?

  1. A tenant can contain multiple domains
  2. Each customer can have one domain and many tenants
  3. A domain can contain multiple tenants
  4. Each customer can have one tenant and no domains

Answer(s): A

Explanation:

In Integrated Cyber Defense Manager (ICDm), a tenant can encompass multiple domains, allowing organizations with complex structures to manage security across various groups or departments within a single tenant. Each tenant represents an overarching entity, while domains within a tenant enable separate administration and policy enforcement for different segments, providing flexibility in security management across large enterprises.



Which type of file attribute is valid for creating a block list entry with Symantec Endpoint Detection and Response (SEDR)?

  1. SHA256
  2. Type
  3. Date Created
  4. Filename

Answer(s): A

Explanation:

When creating a block list entry in Symantec Endpoint Detection and Response (SEDR), the SHA256 hash is a valid file attribute. SHA256 uniquely identifies files based on their content, making it a reliable attribute for ensuring that specific files, regardless of their names or creation dates, are accurately blocked. This hashing method helps prevent identified malicious files from executing, regardless of their locations or renaming attempts by attackers.



Which SES feature helps administrators apply policies based on specific endpoint profiles?

  1. Policy Bundles
  2. Device Profiles
  3. Policy Groups
  4. Device Groups

Answer(s): D

Explanation:

In Symantec Endpoint Security (SES), Device Groups enable administrators to apply policies based on specific endpoint profiles. Device Groups categorize endpoints according to characteristics like department, location, or device type, allowing tailored policy application that meets the specific security needs of each group. By using Device Groups, administrators can efficiently manage security policies, ensuring relevant protections are applied based on the endpoint's profile.



What should an administrator utilize to identify devices on a Mac?

  1. Use DevViewer when the Device is connected.
  2. Use Devicelnfo when the Device is connected.
  3. Use Device Manager when the Device is connected.
  4. Use GatherSymantecInfo when the Device is connected.

Answer(s): D

Explanation:

To identify devices on a Mac, administrators can use the GatherSymantecInfo tool when the device is connected. This tool collects system information and diagnostic data specific to Symantec Endpoint Protection, helping administrators accurately identify and troubleshoot devices. Using GatherSymantecInfo ensures comprehensive data gathering, which is crucial for managing and supporting endpoints in a Mac environment.






Post your Comments and Discuss Broadcom 250-580 exam prep with other Community members:

Join the 250-580 Discussion