Broadcom 250-586 Exam
Endpoint Security Complete Implementation - Technical Specialist (Page 5 )

Updated On: 7-Feb-2026

What is purpose of the Solution Configuration Design in the Implement phase?

  1. To provide a brief functional overview of the component placement in the environment
  2. To outline the hardware requirements for on-premise components
  3. To guide the implementation of features and functions
  4. To detail the storage estimates and hardware configuration

Answer(s): C

Explanation:

The Solution Configuration Design in the Implement phase serves to guide the implementation of features and functions within the deployment. It provides specific details on how to configure the solution to meet the organization's security requirements.

Purpose in Implementation: This document provides detailed instructions for configuring each feature and function that the solution requires. It helps ensure that all components are set up according to the design specifications.

Guidance for Administrators: The Solution Configuration Design outlines precise configurations, enabling administrators to implement necessary controls, settings, and policies.

Consistency in Deployment: By following this document, the implementation team can maintain a consistent approach across the environment, ensuring that all features operate as intended and that security measures align with the intended use case.

Explanation of Why Other Options Are Less Likely:

Option A (brief functional overview) is typically part of the initial design phase.

Option B (hardware requirements) would be part of the Infrastructure Design.

Option D (storage and hardware configuration) is more relevant to system sizing rather than feature configuration.

Thus, the Solution Configuration Design is key to guiding the implementation of features and functions.



What is the recommended setup to ensure clients automatically fallback to their Priority 1 server(s) in case of a faulty SEP Manager?

  1. Configure all SEP Managers with equal priority
  2. Configure all SEP Managers with different priorities
  3. Do not configure any priority for SEP Managers
  4. Use a separate fallback server

Answer(s): A

Explanation:

To ensure clients can automatically fall back to their Priority 1 server(s) if a SEP Manager fails, it is recommended to configure all SEP Managers with equal priority.

Fallback Mechanism: When SEP Managers are set with equal priority, clients can automatically reconnect to any available server in their priority group. This setup offers a high-availability solution, allowing clients to quickly fall back to another server if their primary SEP Manager becomes unavailable.

Ensuring Continuity: Equal priority settings enable seamless client-server communication, ensuring clients do not experience interruptions in receiving policy updates or security content.

High Availability: This configuration supports a robust failover system where clients are not dependent on a single manager, thus enhancing resilience against server outages.

Explanation of Why Other Options Are Less Likely:

Option B (different priorities) could cause delays in failover as clients would have to exhaust Priority 1 servers before attempting Priority 2 servers.

Option C (no priority configuration) would lead to inconsistent fallback behavior.

Option D (separate fallback server) adds complexity and is not required for effective client fallback.

Therefore, setting all SEP Managers with equal priority is the recommended setup.



Where can you submit evidence of malware not detected by Symantec products?

  1. SymProtect Cases Page
  2. Virus Definitions and Security Update Page
  3. SymSubmit Page
  4. Symantec Vulnerability Response page

Answer(s): C

Explanation:

The SymSubmit Page is the designated platform for submitting evidence of malware not detected by Symantec products. This process allows Symantec to analyze the submission and potentially update its definitions or detection techniques.

Purpose of SymSubmit: This page is specifically set up to handle customer-submitted files that may represent new or undetected threats, enabling Symantec to improve its malware detection capabilities.

Process of Submission: Users can submit files, URLs, or detailed descriptions of the suspected malware, and Symantec's security team will review these submissions for potential inclusion in future updates.

Improving Detection: By submitting undetected malware, organizations help Symantec maintain up- to-date threat intelligence, which enhances protection for all users.

Explanation of Why Other Options Are Less Likely:

Option A (SymProtect Cases Page) is not intended for malware submissions.

Option B (Virus Definitions and Security Update Page) provides updates, not a submission platform.

Option D (Symantec Vulnerability Response page) is focused on reporting software vulnerabilities, not malware.

The correct location for submitting undetected malware is the SymSubmit Page.



What is the primary purpose of the Pilot Deployment in the Implementation phase?

  1. To validate the effectiveness of the solution design in the customer's environment
  2. To ensure that the communication paths between major components have been established
  3. To ensure that any potential outstanding activities and tasks are assigned to the right people
  4. To ensure that all accounts are set with their allocated permissions and assignments

Answer(s): A

Explanation:

The primary purpose of the Pilot Deployment in the Implementation phase is to validate the effectiveness of the solution design in the customer's environment. This stage is crucial for testing the solution in a real-world setting, allowing the implementation team to verify that the deployment meets the planned objectives.

Validation in Real-World Conditions: The Pilot Deployment tests how the solution performs under actual operating conditions, identifying any gaps or adjustments needed before full deployment.

Fine-Tuning the Solution: Feedback and performance metrics from the pilot help refine settings, policies, and configurations to ensure optimal security and usability.

User Acceptance Testing: This phase also allows end users and administrators to interact with the system, providing insights on usability and any necessary training or adjustments.

Explanation of Why Other Options Are Less Likely:

Option B (establishing communication paths) and Option D (setting account permissions) are preliminary tasks.

Option C (assigning tasks) is an administrative step that doesn't align with the primary testing purpose of the Pilot Deployment.

Thus, validating the effectiveness of the solution design is the primary goal of the Pilot Deployment.



Which two options are available when configuring DNS change detected for SONAR? (Select two.)

  1. Block
  2. Active Response
  3. Quarantine
  4. Log
  5. Trace

Answer(s): A,D

Explanation:

When configuring DNS change detection for SONAR, two available options are Block and Log. These options allow administrators to define how SONAR should respond to unexpected or suspicious DNS changes.

Block: This option enables SONAR to immediately block DNS changes that it detects as potentially malicious, preventing suspicious DNS redirections that could expose endpoints to threats like phishing or malware sites.

Log: Selecting Log allows SONAR to record DNS changes without taking direct action. This option is useful for monitoring purposes, providing a record of changes for further analysis.

Explanation of Why Other Options Are Less Likely:

Option B (Active Response) and Option C (Quarantine) are generally associated with threat responses but are not specific to DNS change detection.

Option E (Trace) is not an available response option for DNS changes in SONAR.

Therefore, the correct options for configuring DNS change detected for SONAR are Block and Log.



Viewing page 5 of 16
Viewing questions 21 - 25 out of 75 questions



Post your Comments and Discuss Broadcom 250-586 exam prep with other Community members:

Join the 250-586 Discussion