Free Broadcom 250-580 Exam Actual Questions

The questions for 250-580 were last updated On Dec 16, 2024

Question No. 1

Which device page should an administrator view to track the progress of an issued device command?

Show Answer Hide Answer
Correct Answer: C

The Command Status page is where an administrator should track the progress of issued device commands in Symantec Endpoint Security. This page provides:

Real-Time Command Updates: It shows the current status of commands, such as 'Pending,' 'Completed,' or 'Failed,' providing immediate insights into the command's execution.

Detailed Progress Tracking: Command Status logs offer details on each command, enabling the administrator to confirm that actions, such as scans, updates, or reboots, have been successfully processed by the endpoint.

The Command Status page is essential for effective device management, as it helps administrators monitor and verify the outcome of their issued commands.


Question No. 2

Which ICDm role is required in order to use LiveShell?

Show Answer Hide Answer
Correct Answer: B

The Administrator role is required to use LiveShell in Symantec's Integrated Cyber Defense Manager (ICDm). LiveShell allows administrators to open a command-line interface on endpoints, providing direct access for troubleshooting and incident response.

Why Administrator Role is Necessary:

LiveShell grants high-level access to endpoints, so it is limited to users with Administrator privileges to prevent misuse and ensure only authorized personnel can initiate command-line sessions on endpoints.

Why Other Roles Are Incorrect:

Security Analyst (Option A) and Viewer (Option C) do not have the necessary permissions to execute commands on endpoints.

Any (Option D) is incorrect because LiveShell access is restricted to the Administrator role for security reasons.


Question No. 3

An administrator needs to increase the access speed for client files that are stored on a file server. Which configuration should the administrator review to address the read speed from the server?

Show Answer Hide Answer
Correct Answer: A

To improve access speed for client files stored on a file server, the administrator should Enable Network Cache within the client's Virus and Spyware Protection policy. This setting allows client machines to cache scanned files from the network, thus reducing redundant scans and increasing read speed from the server.

How Network Cache Enhances Read Speed:

When Network Cache is enabled, previously scanned files are cached, allowing subsequent access without re-scanning, which decreases latency and improves access speed.

Why Other Options Are Less Effective:

Adding the server to a trusted host group (Option B) does not directly impact file read speeds.

Creating a firewall allow rule (Option C) allows connectivity but does not affect the speed of file access.

Enabling download randomization (Option D) only staggers update downloads and does not relate to read speeds from a file server.


Question No. 4

What does a medium-priority incident indicate?

Show Answer Hide Answer
Correct Answer: A

A medium-priority incident in Symantec's framework indicates that the incident may have an impact on the business. This priority level suggests that while the incident is not immediately critical, it still poses a potential risk to business operations and should be addressed.

Understanding Medium-Priority Impact:

Medium-priority incidents are not severe enough to cause immediate operational disruption but may still affect business processes or data security if left unresolved.

Prompt action is recommended to prevent escalation or downstream effects on business functions.

Why Other Options Are Incorrect:

Business outage (Option B) would likely be classified as high priority.

No impact on critical operations (Option C) would suggest a lower priority.

Safe to ignore (Option D) does not reflect the importance of addressing medium-priority incidents.


Question No. 5

An administrator is investigating a possible threat that occurs during the Windows startup. A file is observed that is NOT digitally signed by Microsoft. Which Anti-malware feature should the administrator enable to scan this file for threats?

Show Answer Hide Answer
Correct Answer: A

Early Launch Antimalware (ELAM) is a feature that is designed to provide anti-malware protection during the early stages of Windows startup. When ELAM is enabled, it scans drivers and files that load during startup, especially those not digitally signed by trusted sources like Microsoft.

How ELAM Works:

ELAM loads before other drivers at startup and scans critical files and drivers, identifying potential malware that may attempt to execute before other security layers are fully operational.

Since the file observed is not digitally signed by Microsoft, ELAM would detect and analyze it at boot, preventing possible threats from initializing.

Advantages of ELAM:

It provides proactive defense against rootkits and other threats that may try to gain persistence on the system by loading during the Windows boot process.

Why Other Options Are Less Suitable:

Auto-Protect and Behavioral Analysis are effective but operate after the system has booted.

Microsoft ELAM is already enabled by default in Windows but does not provide the same customizability as SEP's ELAM feature.