Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Administration of Symantec Advanced Threat Protection 3.0

Last Update 21 hours ago Total Questions : 96

The Administration of Symantec Advanced Threat Protection 3.0 content is now fully updated, with all current exam questions added 21 hours ago. Deciding to include 250-441 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our 250-441 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these 250-441 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Administration of Symantec Advanced Threat Protection 3.0 practice test comfortably within the allotted time.

Question # 4

Which SEP technology does an Incident Responder need to enable in order to enforce blacklisting on an

endpoint?

A.

System Lockdown

B.

Intrusion Prevention System

C.

Firewall

D.

SONAR

Question # 5

An Incident Responder has noticed that for the last month, the same endpoints have been involved with malicious traffic every few days. The network team also identified a large amount of bandwidth being used over P2P protocol.

Which two steps should the Incident Responder take to restrict the endpoints while maintaining normal use of the systems? (Choose two.)

A.

Report the users to their manager for unauthorized usage of company resources

B.

Blacklist the domains and IP associated with the malicious traffic

C.

Isolate the endpoints

D.

Blacklist the endpoints

E.

Find and blacklist the P2P client application

Question # 6

In which two locations should an Incident Responder gather data for an After Actions Report in ATP? (Choose

two.)

A.

Policies page

B.

Action Manager

C.

Syslog

D.

Incident Manager

E.

Indicators of compromise (IOC) search

Question # 7

Which stage of an Advanced Persistent Threat (APT) attack do attackers map an organization’s defenses from the inside?

A.

Discovery

B.

Capture

C.

Exfiltration

D.

Incursion

Question # 8

What is the role of Synapse within the Advanced Threat Protection (ATP) solution?

A.

Reputation-based security

B.

Event correlation

C.

Network detection component

D.

Detonation/sandbox

Question # 9

What is the earliest stage at which a SQL injection occurs during an Advanced Persistent Threat (APT) attack?

A.

Exfiltration

B.

Incursion

C.

Capture

D.

Discovery

Question # 10

An Incident Responder wants to create a timeline for a recent incident using Syslog in addition to ATP for the

After Actions Report.

What are two reasons the responder should analyze the information using Syslog? (Choose two.)

A.

To have less raw data to analyze

B.

To evaluate the data, including information from other systems

C.

To access expanded historical data

D.

To determine what policy settings to modify in the Symantec Endpoint Protection Manager (SEPM)

E.

To determine the best cleanup method

Go to page: