Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Symantec 250-580 Practice Exam with Questions & Answers | Set: 4

Questions 31

Which designation should an administrator assign to the computer configured to find unmanaged devices?

Options:
A.

Discovery Device

B.

Discovery Manager

C.

Discovery Agent

D.

Discovery Broker

Symantec 250-580 Premium Access
Questions 32

Files are blocked by hash in the deny list policy. Which algorithm is supported, in addition to MD5?

Options:
A.

SHA2

B.

SHA256

C.

SHA256 "salted"

D.

MD5 "Salted"

Questions 33

Which security threat stage seeks to gather valuable data and upload it to a compromised system?

Options:
A.

Exfiltration

B.

Impact

C.

Lateral Movement

D.

Command and Control

Questions 34

What feature is used to get a comprehensive picture of infected endpoint activity?

Options:
A.

Entity View

B.

Process View

C.

Full Dump

D.

Endpoint Dump

Questions 35

An Application Control policy includes an Allowed list and a Blocked list. A user wants to use an application that is neither on the Allowed list nor on the Blocked list. What can the user do to gain access to the application?

Options:
A.

Email the App Control Admin

B.

Request an Override

C.

Install the application

D.

Wait for the Application Drift process to complete

Questions 36

Which action can an administrator take to improve the Symantec Endpoint Protection Manager (SEPM) dashboard performance and report accuracy?

Options:
A.

Decreasing the number of content revisions to keep

B.

Lowering the client installation log entries

C.

Rebuilding database indexes

D.

Limiting the number of backups to keep

Questions 37

A user is unknowingly about to connect to a malicious website and download a known threat within a .rar file. All Symantec Endpoint Protection technologies are installed on the client's system.

In which feature set order must the threat pass through to successfully infect the system?

Options:
A.

Download Insight, Firewall, IPS

B.

Firewall, IPS, Download Insight

C.

IPS, Firewall, Download Insight

D.

Download Insight, IPS, Firewall

Questions 38

What should an administrator utilize to identify devices on a Mac?

Options:
A.

UseDevViewerwhen the Device is connected.

B.

Use Devicelnfo when the Device is connected.

C.

UseDevice Managerwhen the Device is connected.

D.

UseGatherSymantecInfowhen the Device is connected.

Questions 39

The SES Intrusion Prevention System has blocked an intruder's attempt to establish an IRC connection inside the firewall. Which Advanced Firewall Protection setting should an administrator enable to prevent the intruder's system from communicating with the network after the IPS detection?

Options:
A.

Enable port scan detection

B.

Automatically block an attacker's IP address

C.

Block all traffic until the firewall starts and after the firewall stops

D.

Enable denial of service detection

Questions 40

What does an end-user receive when an administrator utilizes the Invite User feature to distribute the SES client?

Options:
A.

An email with the SES_setup.zip file attached

B.

An email with a link to register on the ICDm user portal

C.

An email with a link to directly download the SES client

D.

An email with a link to a KB article explaining how to install the SES Agent

Exam Code: 250-580
Certification Provider: Symantec
Exam Name: Endpoint Security Complete - R2 Technical Specialist
Last Update: Sep 13, 2025
Questions: 150