Here you can find all the free questions related with Broadcom Endpoint Security Complete - R2 Technical Specialist (250-580) exam. You can also find on this page links to recently updated premium files with which you can practice for actual Broadcom Endpoint Security Complete - R2 Technical Specialist Exam. These premium versions are provided as 250-580 exam practice tests, both as desktop software and browser based application, you can use whatever suits your style. Feel free to try the Endpoint Security Complete - R2 Technical Specialist Exam premium files for free, Good luck with your Broadcom Endpoint Security Complete - R2 Technical Specialist Exam.
Question No: 1
MultipleChoice
Which two (2) instances could cause Symantec Endpoint Protection to be unable to remediate a file? (Choose two.)
Options
Answer B, CExplanation
Symantec Endpoint Protection (SEP) may be unable to remediate a file in certain situations. Two primary reasons for this failure are:
The detected file is in use (Option B): When a file is actively being used by the system or an application, SEP cannot remediate or delete it until it is no longer in use. Active files are locked by the operating system, preventing modification.
Insufficient file permissions (Option C): SEP needs adequate permissions to access and modify files. If SEP does not have the necessary permissions for the detected file, it cannot perform remediation.
Why Other Options Are Incorrect:
Another scan in progress (Option A) does not directly prevent remediation.
File marked for deletion on restart (Option D) would typically allow SEP to complete the deletion upon reboot.
File with good reputation (Option E) is less likely to be flagged for remediation but would not prevent it if flagged.
Question No: 2
MultipleChoice
How does an administrator view all devices impacted by a suspicious file?
Options
Answer CExplanation
To view all devices impacted by a suspicious file, the administrator should go to the Discovered Items list, select the specific file, and then view the impacted devices from the Details page.
Steps to View Impacted Devices:
Navigate to the Discovered Items list within the management console.
Locate and select the suspicious file in question to open its Details page.
On the Details page, a list of devices associated with the file is displayed, providing insights into which endpoints are potentially impacted by the suspicious activity.
Why Other Options Are Less Suitable:
Options A and B do not provide the specific device list for a selected file.
Option D is incorrect as it implies selecting by device first rather than by suspicious file.