최신 250-441 무료덤프 - Symantec Administration of Symantec Advanced Threat Protection 3.0
Which access credentials does an ATP Administrator need to set up a deployment of ATP: Endpoint, Network, and Email?
정답: B
Which threat is an example of an Advanced Persistent Threat (APT)?
정답: A
Which stage of an Advanced Persistent Threat (APT) attack do attackers send information back to the home base?
정답: A
An Incident Responder observers and incident with multiple malware downloads from a malicious domain.
The domain in question belongs to one of the organization suppliers. The organization to the site to continue placing orders. Network is configured in Inline Block mode?
How should the Incident responder proceed?
The domain in question belongs to one of the organization suppliers. The organization to the site to continue placing orders. Network is configured in Inline Block mode?
How should the Incident responder proceed?
정답: C
An ATP Administrator has deployed ATP: Network, Endpoint, and Email and now wants to ensure that all connections are properly secured.
Which connections should the administrator secure with signed SSL certificates?
Which connections should the administrator secure with signed SSL certificates?
정답: A
Why is it important for an Incident Responder to review Related Incidents and Events when analyzing an incident for an After Actions Report?
정답: B
Which default port does ATP use to communicate with the Symantec Endpoint Protection Manager (SEPM) web services?
정답: A
ATP detects a threat phoning home to a command and control server and creates a new incident. The treat is NOT being detected by SEP, but the Incident Response team conducted an indicators of compromise (IOC) search for the machines that are contacting the malicious sites to gather more information.
Which step should the Incident Response team incorporate into their plan of action?
Which step should the Incident Response team incorporate into their plan of action?
정답: D
Which two user roles allow an Incident Responder to blacklist or whitelist files using the ATP manager?
(Choose two.)
(Choose two.)
정답: C,E
Which SEP technology does an Incident Responder need to enable in order to enforce blacklisting on an endpoint?
정답: C