Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Administration of Symantec Advanced Threat Protection 3.0

Last Update 23 hours ago Total Questions : 96

The Administration of Symantec Advanced Threat Protection 3.0 content is now fully updated, with all current exam questions added 23 hours ago. Deciding to include 250-441 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our 250-441 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these 250-441 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Administration of Symantec Advanced Threat Protection 3.0 practice test comfortably within the allotted time.

Question # 11

Which two questions can an Incident Responder answer when analyzing an incident in ATP? (Choose two.)

A.

Does the organization need to do a healthcheck in the environment?

B.

Are certain endpoints being repeatedly attacked?

C.

Is the organization being attacked by this external entity repeatedly?

D.

Do ports need to be blocked or opened on the firewall?

E.

Does a risk assessment need to happen in the environment?

Question # 12

An Incident Responder notices traffic going from an endpoint to an IRC channel. The endpoint is listed in an

incident. ATP is configured in TAP mode.

What should the Incident Responder do to stop the traffic to the IRC channel?

A.

Isolate the endpoint with a Quarantine Firewall policy

B.

Blacklist the IRC channel IP

C.

Blacklist the endpoint IP

D.

Isolate the endpoint with an application control policy

Question # 13

What is the main constraint an ATP Administrator should consider when choosing a network scanner model?

A.

Throughput

B.

Bandwidth

C.

Link speed

D.

Number of users

Question # 14

Which Advanced Threat Protection (ATP) component best isolates an infected computer from the network?

A.

ATP: Email

B.

ATP: Endpoint

C.

ATP: Network

D.

ATP: Roaming

Question # 15

Which National Institute of Standards and Technology (NIST) cybersecurity function is defined as “finding

incursions”?

A.

Protect

B.

Identify

C.

Respond

D.

Detect

Question # 16

Which default port does ATP use to communicate with the Symantec Endpoint Protection Manager (SEPM)

web services?

A.

8446

B.

8081

C.

8014

D.

1433

Question # 17

Which best practice does Symantec recommend with the Endpoint Detection and Response feature?

A.

Create a unique Cynic account to provide to ATP

B.

Create a unique Symantec Messaging Gateway account to provide to ATP

C.

Create a unique Symantec Protection Manager (SEPM) administrator account to provide to ATP

D.

Create a unique Email Security.cloud portal account to provide to ATP

Question # 18

Why is it important for an Incident Responder to analyze an incident during the Recovery phase?

A.

To determine the best plan of action for cleaning up the infection

B.

To isolate infected computers on the network and remediate the threat

C.

To gather threat artifacts and review the malicious code in a sandbox environment

D.

To access the current security plan, adjust where needed, and provide reference materials in the event of a similar incident

Question # 19

An Incident Responder runs an endpoint search on a client group with 100 endpoints. After one day, the

responder sees the results for 90 endpoints.

What is a possible reason for the search only returning results for 90 of 100 endpoints?

A.

The search expired after one hour

B.

10 endpoints are offline

C.

The search returned 0 results on 10 endpoints

D.

10 endpoints restarted and cancelled the search

Question # 20

Malware is currently spreading through an organization’s network. An Incident Responder sees some

detections in SEP, but there is NOT an apparent relationship between them.

How should the responder look for the source of the infection using ATP?

A.

Check for the file hash for each detection

B.

Isolate a system and collect a sample

C.

Submit the hash to Virus Total

D.

Check of the threats are downloaded from the same domain or IP by looking at incidents

Go to page: