Broadcom 250-580 Endpoint Security Complete – R2 Technical Specialist Online Training
Broadcom 250-580 Online Training
The questions for 250-580 were last updated at Jul 18,2025.
- Exam Code: 250-580
- Exam Name: Endpoint Security Complete - R2 Technical Specialist
- Certification Provider: Broadcom
- Latest update: Jul 18,2025
Which technology can prevent an unknown executable from being downloaded through a browser session?
- A . Intrusion Prevention
- B . Insight
- C . Application Control
- D . Advanced Machine Learning
What should an administrator know regarding the differences between a Domain and a Tenant in ICDm?
- A . A tenant can contain multiple domains
- B . Each customer can have one domain and many tenants
- C . A domain can contain multiple tenants
- D . Each customer can have one tenant and no domains
Which type of file attribute is valid for creating a block list entry with Symantec Endpoint Detection and Response (SEDR)?
- A . SHA256
- B . Type
- C . Date Created
- D . Filename
Which SES feature helps administrators apply policies based on specific endpoint profiles?
- A . Policy Bundles
- B . Device Profiles
- C . Policy Groups
- D . Device Groups
What should an administrator utilize to identify devices on a Mac?
- A . Use DevViewer when the Device is connected.
- B . Use Devicelnfo when the Device is connected.
- C . Use Device Manager when the Device is connected.
- D . Use GatherSymantecInfo when the Device is connected.
What is an appropriate use of a file fingerprint list?
- A . Allow unknown files to be downloaded with Insight
- B . Prevent programs from running
- C . Prevent Antivirus from scanning a file
- D . Allow files to bypass Intrusion Prevention detection
What is the purpose of a Threat Defense for Active Directory Deceptive Account?
- A . It prevents attackers from reading the contents of the Domain Admins Group.
- B . It assigns a fake NTLM password hash value for users with an assigned AdminCount attribute.
- C . It exposes attackers as they seek to gather credential information from workstation memory.
- D . It acts as a honeypot to expose attackers as they attempt to build their AD treasure map
When are events generated within SEDR?
- A . When an incident is selected
- B . When an activity occurs
- C . When any event is opened
- D . When entities are viewed
What tool can administrators use to create custom behavioral isolation policies based on collected application behavior data?
- A . Behavioral Prevalence Check
- B . Behavioral Heat Map
- C . Application Catalog
- D . Application Frequency Map
A file has been identified as malicious.
Which feature of SEDR allows an administrator to manually block a specific file hash?
- A . Playbooks
- B . Quarantine
- C . Allow List
- D . Block List