Broadcom
250-580
Q1:
What does the MITRE ATT&CK Matrix consist of?
○
A
Problems and Solutions○
B
Attackers and Techniques○
C
Tactics and Techniques○
D
Entities and Tactics
Broadcom
250-580
Q2:
Where in the Attack Chain does Threat Defense for Active Directory provide protection?
○
A
Attack Surface Reduction○
B
Attack Prevention○
C
Detection and Response○
D
Breach Prevention
Broadcom
250-580
Q3:
Which default role has the most limited permission in the Integrated Cyber Defense Manager?
○
A
Endpoint Console Domain Administrator○
B
Server Administrator○
C
Restricted Administrator○
D
Limited Administrator
Broadcom
250-580
Q4:
Which technique randomizes the memory address map with Memory Exploit Mitigation?
○
A
ForceDEP○
B
SEHOP○
C
ASLR○
D
ROPHEAP
Broadcom
250-580
Q5:
What methods should an administrator utilize to restore communication on a client running SEP for Mac?
○
A
Use Client Deployment Wizard to push out a communications package.○
B
Use the Sylink Drop Tool on the SEPM.○
C
Use SSH and run the command:○
D
sudo launchct1 load /Library/LaunchDaemons/eom.Symantec.symdaemon.'plist○
E
Use Third Party Deployment to push out a communications package.