Free Broadcom 250-580 Exam Actual Questions

The questions for 250-580 were last updated On Jan 16, 2025

Question No. 1

In what order should an administrator configure the integration between SEDR and Symantec Endpoint Protection in order to maximize their benefits?

Show Answer Hide Answer
Correct Answer: B

To integrate Symantec Endpoint Detection and Response (SEDR) with Symantec Endpoint Protection (SEP) effectively, the recommended configuration order is ECC, Synapse, then Insight Proxy.

Order of Configuration:

ECC (Endpoint Communication Channel): This establishes the communication layer for SEDR and SEP integration, which is foundational for data exchange.

Synapse: This integration uses data from ECC to correlate threat intelligence and provide context to detected threats.

Insight Proxy: Configured last, Insight Proxy adds cloud-based file reputation lookups, enhancing detection capabilities with reputation scoring.

Why This Order is Effective:

Each component builds on the previous one, maximizing the value of integration by ensuring that foundational communication (ECC) is established before adding Synapse correlation and Insight Proxy reputation data.


Question No. 2

The Behavioral Heat Map indicates that a specific application and a specific behavior are never used together. What action can be safely set for the application behavior in a Behavioral Isolation policy?

Show Answer Hide Answer
Correct Answer: A

In Symantec EDR's Behavioral Isolation policy, if the Behavioral Heat Map indicates that a specific application and a particular behavior are never used together, setting the action to Deny for that application behavior is a safe response. This prevents potential misuse by blocking the unusual behavior, which could indicate a security risk.

Rationale for Denying the Behavior:

If historical data shows that this behavior does not normally occur with the application, it suggests that any attempt to initiate it could be anomalous or malicious. Blocking this behavior helps prevent unexpected activities that could be exploited by threats.

Why Other Actions Are Less Appropriate:

Allow (Option B) would permit potentially risky behavior.

Delete (Option C) does not apply in this context, as it is not an action for behavior control.

Monitor (Option D) would only log the behavior but does not provide active protection, which is critical when the behavior is atypical.


Question No. 3

What type of policy provides a second layer of defense, after the Symantec firewall?

Show Answer Hide Answer
Correct Answer: C

The Intrusion Prevention System (IPS) provides a second layer of defense after the Symantec firewall. While the firewall controls access and traffic flow at the network perimeter, IPS actively monitors and inspects incoming and outgoing traffic for signs of malicious activity, such as exploit attempts and suspicious network patterns.

How IPS Complements the Firewall:

The firewall acts as the first layer of defense, blocking unauthorized access based on rules and policies.

IPS then inspects allowed traffic in real-time, identifying and blocking attacks that may evade basic firewall rules, such as known exploits and abnormal network behaviors.

Why Other Options Are Less Effective:

Virus and Spyware (Option A) focuses on malware detection within files and programs, not network defense.

Host Integrity (Option B) is related to compliance, and System Lockdown (Option D) controls application execution but does not monitor network traffic.


Question No. 4

What is the difference between running Device Control for a Mac versus Windows?

Show Answer Hide Answer
Correct Answer: B

Device Control operates differently on Mac compared to Windows in Symantec Endpoint Protection:

Mac Device Control Functionality:

On macOS, Device Control operates at the volume level, specifically targeting storage devices.

This volume-level control means that SEP enforces policies on storage devices like external drives, USB storage, or other mounted storage volumes rather than peripheral devices in general.

Platform Differences:

On Windows, Device Control can operate at a more granular level (driver level), allowing enforcement across a broader range of devices, including non-storage peripherals.

Why Other Options Are Incorrect:

Option A (driver level) is incorrect for Mac, as SEP does not control non-storage device drivers on macOS.

Option C (kernel level) and D (user level) incorrectly describe the control layer and do not accurately reflect SEP's enforcement scope on Mac.


Question No. 5

Which option should an administrator utilize to temporarily or permanently block a file?

Show Answer Hide Answer
Correct Answer: D

To temporarily or permanently block a file, the administrator should use the Deny List option. Adding a file to the Deny List prevents it from executing or being accessed on the system, providing a straightforward way to block suspicious or unwanted files.

Functionality of Deny List:

Files on the Deny List are effectively blocked from running, which can be applied either temporarily or permanently depending on security requirements.

This list allows administrators to manage potentially malicious files by preventing them from executing across endpoints.

Why Other Options Are Not Suitable:

Delete (Option A) is a one-time action and does not prevent future attempts to reintroduce the file.

Hide (Option B) conceals files but does not restrict access.

Encrypt (Option C) secures the file's data but does not prevent access or execution.