Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Symantec 250-580 Practice Exam with Questions & Answers | Set: 3

Questions 21

A file has been identified as malicious.

Which feature of SEDR allows an administrator to manually block a specific file hash?

Options:
A.

Playbooks

B.

Quarantine

C.

Allow List

D.

Block List

Symantec 250-580 Premium Access
Questions 22

An organization identifies a threat in its environment and needs to limit the spread of the threat. How should the SEP Administrator block the threat using Application and Device Control?

Options:
A.

Gather the MD5 hash of the file and create an Application Content Rule that blocks the file based on the file fingerprint.

B.

Gather the process name of the file and create an Application Content Rule that blocks the file based on the device ID type.

C.

Gather the MD5 hash of the file and create an Application Content Rule that uses regular expression matching.

D.

Gather the MD5 hash of the file and create an Application Content Rule that blocks the file based on specific arguments.

Questions 23

An Incident Responder has determined that an endpoint is compromised by a malicious threat. What SEDR feature would be utilized first to contain the threat?

Options:
A.

File Deletion

B.

Incident Manager

C.

Isolation

D.

Endpoint Activity Recorder

Questions 24

What does the Endpoint Communication Channel (ECC) 2.0 allow Symantec EDR to directly connect to?

Options:
A.

SEDR Cloud Console

B.

Synapse

C.

SEP Endpoints

D.

SEPM

Questions 25

Which Indicator of Compromise might be detected as variations in the behavior of privileged users that indicate that their account is being used by someone else to gain a foothold in an environment?

Options:
A.

Mismatched Port - Application Traffic

B.

Irregularities in Privileged User Account Activity

C.

Surges in Database Read Volume

D.

Geographical Irregularities

Questions 26

The Security Status on the console home page is failing to alert a Symantec Endpoint Protection (SEP) administrator when virus definitions are out of date.

How should the SEP administrator enable the Security Status alert?

Options:
A.

Lower the Security Status thresholds

B.

Raise the Security Status thresholds

C.

Change the Notifications setting to "Show all notifications"

D.

Change the Action Summary display to "By number of computers"

Questions 27

The SES Intrusion Prevention System has blocked an intruder's attempt to establish an IRC connection inside the firewall. Which Advanced Firewall Protection setting should an administrator enable to prevent the intruder's system from communicating with the network after the IPS detection?

Options:
A.

Enable port scan detection

B.

Automatically block an attacker's IP address

C.

Block all traffic until the firewall starts and after the firewall stops

D.

Enable denial of service detection

Questions 28

What does the Endpoint Communication Channel (ECC) 2.0 allow Symantec EDR to directly connect to?

Options:
A.

SEDR Cloud Console

B.

Synapse

C.

SEP Endpoints

D.

SEPM

Questions 29

What should an administrator know regarding the differences between a Domain and a Tenant in ICDm?

Options:
A.

A tenant can contain multiple domains

B.

Each customer can have one domain and many tenants

C.

A domain can contain multiple tenants

D.

Each customer can have one tenant and no domains

Questions 30

What prevention technique does Threat Defense for Active Directory use to expose attackers?

Options:
A.

Process Monitoring

B.

Obfuscation

C.

Honeypot Traps

D.

Packet Tracing

Exam Code: 250-580
Certification Provider: Symantec
Exam Name: Endpoint Security Complete - R2 Technical Specialist
Last Update: Jul 19, 2025
Questions: 150

Symantec Related Exams

Symantec Free Exams

Symantec Free Exams
Get the best free Symantec exam study materials and practice tests at Examstrack. Perfect your Symantec preparation by visiting Examstrack.