Broadcom 250-580 Endpoint Security Complete – R2 Technical Specialist Online Training
Broadcom 250-580 Online Training
The questions for 250-580 were last updated at Jul 18,2025.
- Exam Code: 250-580
- Exam Name: Endpoint Security Complete - R2 Technical Specialist
- Certification Provider: Broadcom
- Latest update: Jul 18,2025
Which SES advanced feature detects malware by consulting a training model composed of known good and known bad files?
- A . Signatures
- B . Reputation
- C . Artificial Intelligence
- D . Advanced Machine Learning
Files are blocked by hash in the deny list policy.
Which algorithm is supported, in addition to MD5?
- A . SHA2
- B . SHA256
- C . SHA256 "salted"
- D . MD5 "Salted"
What is the function of Symantec Insight?
- A . Provides reputation ratings for structured data
- B . Enhances the capability of Group Update Providers (GUP)
- C . Increases the efficiency and effectiveness of LiveUpdate
- D . Provides reputation ratings for binary executables
What does a ranged query return or exclude?
- A . Data matching the exact field names and their values
- B . Data matching a regular expression
- C . Data falling between two specified values of a given field
- D . Data based on specific values for a given field
Which type of security threat continues to threaten endpoint security after a system reboot?
- A . file-less
- B . memory attack
- C . script
- D . Rootkit
What information is required to calculate storage requirements?
- A . Number of endpoints, available bandwidth, available disk space, number of endpoint dumps, dump size
- B . Number of endpoints, EAR data per endpoint per day, number of days to retain, number of endpoint dumps, dump size
- C . Number of endpoints, available bandwidth, number of days to retain, number of endpoint dumps, dump size
- D . Number of endpoints, EAR data per endpoint per day, available disk space, number of endpoint dumps, dump size
The LiveUpdate Download Schedule is set to the default on the Symantec Endpoint Protection Manager (SEPM).
How many content revisions must the SEPM keep to ensure clients that check in to the SEPM every 10 days receive xdelta content packages instead of full content packages?
- A . 10
- B . 20
- C . 30
- D . 60
Which two (2) criteria are used by Symantec Insight to evaluate binary executables? (Select two.)
- A . Sensitivity
- B . Prevalence
- C . Confidentiality
- D . Content
- E . Age
What must be entered before downloading a file from ICDm?
- A . Name
- B . Password
- C . Hash
- D . Date
Which report template type should an administrator utilize to create a daily summary of network threats detected?
- A . Intrusion Prevention Report
- B . Blocked Threats Report
- C . Network Risk Report
- D . Access Violation Report