Broadcom 250-580 Endpoint Security Complete – R2 Technical Specialist Online Training
Broadcom 250-580 Online Training
The questions for 250-580 were last updated at Jul 16,2025.
- Exam Code: 250-580
- Exam Name: Endpoint Security Complete - R2 Technical Specialist
- Certification Provider: Broadcom
- Latest update: Jul 16,2025
How does IPS check custom signatures?
- A . IPS checks for signatures listed in the table. When a detection matches an inbound or outbound traffic packet, the IPS engine continues checking for other signatures.
- B . IPS checks for signatures listed in the table. When a detection matches an inbound or outbound traffic packet, the IPS engine restarts checking for signatures.
- C . IPS checks for signatures listed in the table. When a detection matches an inbound or outbound traffic packet, the IPS engine stops checking other signatures.
- D . IPS checks for signatures listed in the table. When a detection matches an inbound or outbound traffic packet, the IPS engine logs the other signatures.
An Application Control policy includes an Allowed list and a Blocked list. A user wants to use an application that is neither on the Allowed list nor on the Blocked list.
What can the user do to gain access to the application?
- A . Email the App Control Admin
- B . Request an Override
- C . Install the application
- D . Wait for the Application Drift process to complete
What does an end-user receive when an administrator utilizes the Invite User feature to distribute the SES client?
- A . An email with the SES_setup.zip file attached
- B . An email with a link to register on the ICDm user portal
- C . An email with a link to directly download the SES client
- D . An email with a link to a KB article explaining how to install the SES Agent
An organization identifies a threat in its environment and needs to limit the spread of the threat.
How should the SEP Administrator block the threat using Application and Device Control?
- A . Gather the MD5 hash of the file and create an Application Content Rule that blocks the file based on the file fingerprint.
- B . Gather the process name of the file and create an Application Content Rule that blocks the file based on the device ID type.
- C . Gather the MD5 hash of the file and create an Application Content Rule that uses regular expression matching.
- D . Gather the MD5 hash of the file and create an Application Content Rule that blocks the file based on specific arguments.
What EDR feature provides endpoint activity recorder data for a file hash?
- A . Process Dump
- B . Entity Dump
- C . Hash Dump
- D . Full Dump
What Symantec Best Practice is recommended when setting up Active Directory integration with the Symantec Endpoint Protection Manager?
- A . Ensure there is more than one Active Directory Server listed in the Server Properties.
- B . Link the built-in Admin account to an Active Directory account.
- C . Import the existing AD structure to organize clients in user mode.
- D . Secure the management console by denying access to certain computers.
Which SES security control protects a user against data leakage if they encounter a man-in-the-middle attack?
- A . IPv6 Tunneling
- B . IPS
- C . Firewall
- D . VPN
What happens when an administrator adds a file to the deny list?
- A . The file is assigned to a chosen Deny List policy
- B . The file is assigned to the Deny List task list
- C . The file is automatically quarantined
- D . The file is assigned to the default Deny List policy
What is a feature of Cynic?
- A . Local Sandboxing
- B . Forwarding event data to Security Information and Event Management (SIEM)
- C . Cloud Sandboxing
- D . Customizable OS Images
Which IPS signature type is primarily used to identify specific unwanted network traffic?
- A . Attack
- B . Audit
- C . Malcode
- D . Probe