Broadcom Endpoint Protection Technical Specialist (250-428) Certification Sample Questions

Broadcom 250-428 VCE, Endpoint Protection Technical Dumps, 250-428 PDF, 250-428 Dumps, Endpoint Protection Technical VCEGetting knowledge of the Broadcom 250-428 exam structure and question format is vital in preparing for the Symantec Endpoint Protection Technical Specialist certification exam. Our Broadcom Endpoint Protection Technical sample questions offer you information regarding the question types and level of difficulty you will face in the real exam. The benefit of using these Broadcom 250-428 sample questions is that you will get to check your preparation level or enhance your knowledge by learning the unknown questions. You will also get a clear idea of the exam environment and exam pattern you will face in the actual exam with the Symantec Endpoint Protection Technical Specialist Sample Practice Test. Therefore, solve the Broadcom Endpoint Protection Technical sample questions to stay one step forward in grabbing the Broadcom Symantec Endpoint Protection 14 Technical Specialist credential.

These Broadcom 250-428 sample questions are simple and basic questions similar to the actual Broadcom Endpoint Protection Technical questions. If you want to evaluate your preparation level, we suggest taking our Symantec Endpoint Protection Technical Specialist Premium Practice Test. You might face difficulties while solving the real-exam-like questions. But, you can work hard and build your confidence on the syllabus topics through unlimited practice attempts.

Broadcom 250-428 Sample Questions:

01. Scheduled reports are delivered as which type?
b) XML
c) MHT
d) HTM

02. How does an administrator manage Client User Interface Control Settings?
By group
b) By location
c) By domain
d) By user

03. Which two methods can be used to identify the target machines to which the Symantec Endpoint Protection client can be installed when using the Client Deployment Wizard?
(Select two.)
a) Browse through Windows networking.
b) Import a file containing IP addresses.
c) Specify a UNC path.
d) Import a file from the Unmanaged Detector.
e) Enable the ARP Discovery feature.

04. A company recently installed a proxy server and configured firewall rules to allow only HTTP traffic through the perimeter firewall. Since the change, Symantec Endpoint Protection 14 is unable to receive updates.
Which step must be taken on the Symantec Endpoint Protection Manager to receive updates?
Configure proxy settings under Server Properties.
b) Configure proxy settings within Internet Explorer under Internet Options.
c) Configure proxy settings within the External Communication Setting.
d) Configure proxy settings in the LiveUpdate policy.

05. What are two uses of Application Control?
(Select two.)
a) Prevents applications from accessing the registry
b) Prevents applications from creating files
c) Prevents applications from accessing ports
d) Prevents applications from replicating
e) Prevents applications from accessing the network

06. When Auto-Protect is enabled, protection is optional for which type of file access?
b) Access
c) Modify
d) Backup
e) Restore

07. In which two sets of circumstances would it be beneficial to exclude a host within an IPS policy?
(Select two.)
a) A company needs to set up custom intrusion prevent signatures in the IPS policy.
b) To allow a vulnerability scanner on the network to ensure compliance with service agreements
c) A company may have computers on an internal network that need to be set up for testing purposes.
d) To log the activity of a particular machine for auditing
e) To create an exception that will exclude particular IPS signatures

08. An administrator has successfully installed Symantec Endpoint Protection Manager. Which component is deployed to the server at this point in time?
AntiVirus/AntiSpyware Protection
b) Shared Insight Cache
c) Apache Tomcat Server
d) Central Quarantine Server
e) Internet Information Services (IIS)

09. Which criteria is used to define a Tamper Protection exception?
File fingerprint
b) File name
c) MD5 hash
d) Process owner

10. What happens when you mark the "Enable NetBIOS Protection" checkbox?
Verifies remote computer identity using WINS server lookup
b) Blocks NetBIOS requests on all NetBIOS ports
c) Permits NetBIOS connections from local subnet only
d) Dynamically adds an allow rule for NetBIOS


Question: 01
Answer: c
Question: 02
Answer: b
Question: 03
Answer: a, b
Question: 04
Answer: a
Question: 05
Answer: a, b
Question: 06
Answer: a
Question: 07
Answer: b, c
Question: 08
Answer: c
Question: 09
Answer: b
Question: 10
Answer: c

Note: For any error in Symantec Endpoint Protection Technical Specialist (250-428) certification exam sample questions, please update us by writing an email on

Rating: 5 / 5 (80 votes)