Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

250-580 Leak Questions

Page: 11 / 11
Total 150 questions

Endpoint Security Complete - R2 Technical Specialist Questions and Answers

Question 41

What information is required to calculate storage requirements?

Options:

A.

Number of endpoints, available bandwidth, available disk space, number of endpoint dumps, dump size

B.

Number of endpoints, EAR data per endpoint per day, number of days to retain, number of endpoint dumps, dump size

C.

Number of endpoints, available bandwidth, number of days to retain, number of endpoint dumps, dump size

D.

Number of endpoints, EAR data per endpoint per day, available disk space, number of endpoint dumps, dump size

Question 42

What does a medium-priority incident indicate?

Options:

A.

The incident may have an impact on the business

B.

The incident can result in a business outage

C.

The incident does not affect critical business operation

D.

The incident can safely be ignored

Question 43

An administrator decides to migrate an SES Complete hybrid environment to a fully cloud-managed one. After cleaning up on-premise group structure and policies. What is the next recommended step for migration?

Options:

A.

Export unique policies from SEPM

B.

Enroll the SEPM in ICDm

C.

Migrate the agents from ICDm

DImport unique policies in ICDm

Question 44

When a SEPM is enrolled in ICDm, which policy can only be managed from the cloud?

Options:

A.

LiveUpdate

B.

Firewall

C.

Network Intrusion Prevention

D.

Intensive Protection

Page: 11 / 11
Total 150 questions