250-604受験対策書 & 250-604ダウンロード競争がますます激しいIT業種では、Broadcomの250-604試験の認定は欠くことができない認証です。最も早い時間でBroadcomの250-604認定試験に合格したいなら、Pass4TestのBroadcomの250-604試験トレーニング資料を利用すればいいです。もしうちの学習教材を購入した後、試験に不合格になる場合は、私たちが全額返金することを保証いたします。 Broadcom Symantec Endpoint Security Complete Admin R1.4 Technical Specialist 認定 250-604 試験問題 (Q78-Q83):質問 # 78
Which monitoring techniques are used by Threat Defense for Active Directory to identify potentially malicious behaviors in AD environments? (Choose two)
A. Observing abnormal access to administrative shares and sensitive AD objects
B. Analyzing Group Policy inheritance across domain trees
C. Monitoring failed login attempts and abnormal authentication requests
D. Tracking PowerShell command logs and matching them against whitelisted scripts
正解:A、C
質問 # 79
What methods can administrators use to enroll endpoints into SES Complete? (Choose two)
A. Using domain-based deployment with Microsoft GPO
B. By importing certificates from third-party tools
C. Through SEP Mobile device scans
D. Via ICDm using agent installation packages
正解:A、D
質問 # 80
What is the primary requirement before initiating the installation of Threat Defense for Active Directory in an enterprise environment?
A. The client computers must have administrator-level permissions to the endpoint recorder.
B. A minimum of one global exclusion policy must be created in ICDm.
C. An on-premises Domain Controller must be running and accessible to SES Complete.
D. The organizational unit must be registered as a managed domain controller.
正解:C
質問 # 81
During a compliance audit, you are asked to demonstrate how SES Complete prevents Command & Control (C2) connections and exfiltration of sensitive data.
What controls or configurations should you present? (Choose three)
A. Application Launch Monitoring
B. USB Port Whitelisting
C. DNS and IP Reputation Filtering
D. Threat Intelligence Updates
E. Data Loss Prevention Policies
正解:C、D、E
質問 # 82
What prerequisite must be fulfilled before administrators can enable the Network Integrity feature within the ICDm management console for securing mobile and modern devices?
A. The endpoints must be registered in audit-only mode before policy enforcement begins.
B. The administrator must first apply an antivirus-only policy group to the devices.
C. The cloud policy manager must be enabled on the firewall appliance.
D. A valid Network Integrity license must be activated and associated with the device group.