Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Symantec 250-580 Practice Exam with Questions & Answers

Questions 1

What priority would an incident that may have an impact on business be considered?

Options:
A.

Low

B.

Critical

C.

High

D.

Medium

Symantec 250-580 Premium Access
Questions 2

An Application Control policy includes an Allowed list and a Blocked list. A user wants to use an application that is neither on the Allowed list nor on the Blocked list. What can the user do to gain access to the application?

Options:
A.

Email the App Control Admin

B.

Request an Override

C.

Install the application

D.

Wait for the Application Drift process to complete

Questions 3

Using a hybrid environment, if a SEPM-managed endpoint cannot connect to the SEPM, how quickly can an administrator receive a security alert if the endpoint is using a public hot-spot?

Options:
A.

After a VPN is activated with Network Integrity

B.

When the client connects to SEPM

C.

At the next heartbeat

D.

Immediately

Questions 4

Which type of security threat continues to threaten endpoint security after a system reboot?

Options:
A.

file-less

B.

memory attack

C.

script

D.

Rootkit

Questions 5

What EDR function minimizes the risk of an endpoint infecting other resources in the environment?

Options:
A.

Quarantine

B.

Block

C.

Deny List

D.

Firewall

Questions 6

Which term or expression is utilized when adversaries leverage existing tools in the environment?

Options:
A.

opportunistic attack

B.

file-less attack

C.

script kiddies

D.

living off the land

Questions 7

Which type of event does operation:1indicate in a SEDR database search?

Options:
A.

File Deleted.

B.

File Closed.

C.

File Open.

D.

File Created.

Questions 8

Which action must a Symantec Endpoint Protection administrator take before creating custom Intrusion Prevention signatures?

Options:
A.

Change the custom signature order

B.

Create a Custom Intrusion Prevention Signature library

C.

Define signature variables

D.

Enable signature logging

Questions 9

The Behavioral Heat Map indicates that a specific application and a specific behavior are never used together. What action can be safely set for the application behavior in a Behavioral Isolation policy?

Options:
A.

Deny

B.

Allow

C.

Delete

D.

Monitor

Questions 10

Which type of file attribute is valid for creating a block list entry with Symantec Endpoint Detection and Response (SEDR)?

Options:
A.

SHA256

B.

Type

C.

Date Created

D.

Filename

Exam Code: 250-580
Certification Provider: Symantec
Exam Name: Endpoint Security Complete - R2 Technical Specialist
Last Update: Jul 15, 2025
Questions: 150

Symantec Related Exams

Symantec Free Exams

Symantec Free Exams
Get the best free Symantec exam study materials and practice tests at Examstrack. Perfect your Symantec preparation by visiting Examstrack.