New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Helping Hand Questions for 250-580

Page: 9 / 11
Total 150 questions

Endpoint Security Complete - R2 Technical Specialist Questions and Answers

Question 33

What is the result of disjointed telemetry collection methods used within an organization?

Options:

A.

Investigators lack granular visibility

B.

Back of orchestration across controls

C.

False positives are seen

D.

Attacks continue to spread during investigation

Question 34

Which Symantec Endpoint Protection technology blocks a downloaded program from installing browser plugins?

Options:

A.

Intrusion Prevention

B.

SONAR

C.

Application and Device Control

D.

Tamper Protection

Question 35

Which report template type should an administrator utilize to create a daily summary of network threats detected?

Options:

A.

Intrusion Prevention Report

B.

Blocked Threats Report

C.

Network Risk Report

D.

Access Violation Report

Question 36

Which security control performs a cloud lookup on files downloaded during the Initial Access phase?

Options:

A.

Exploit Protection

B.

Auto-Protect

C.

Intrusion Prevention

D.

Antimalware

Page: 9 / 11
Total 150 questions