Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

Symantec 250-441 Administration of Symantec Advanced Threat Protection 3.0 Exam Practice Test

Page: 1 / 9
Total 90 questions

Administration of Symantec Advanced Threat Protection 3.0 Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

What is the minimum amount of RAM required for a virtual deployment of the ATP Manager in a production environment?

Options:

A.

48 GB

B.

64 GB

C.

16 GB

D.

32GB

Question 2

What does a Quarantine Firewall policy enable an ATP Administrator to do?

Options:

A.

Isolate a computer while it is manually being remediated

B.

Submit files to a Central Quarantine server

C.

Filter all traffic leaving the network

D.

Intercept all traffic entering the network

Question 3

Which section of the ATP console should an ATP Administrator use to evaluate prioritized threats within the environment?

Options:

A.

Search

B.

Action Manager

C.

Incident Manager

D.

Events

Question 4

What is the role of Synapse within the Advanced Threat Protection (ATP) solution?

Options:

A.

Reputation-based security

B.

Event correlation

C.

Network detection component

D.

Detonation/sandbox

Question 5

Which two tasks should an Incident Responder complete when recovering from an incident? (Choose two.)

Options:

A.

Rejoin healthy endpoints back to the network

B.

Blacklist any suspicious files found in the environment

C.

Submit any suspicious files to Cynic

D.

Isolate infected endpoints to a quarantine network

E.

Delete threat artifacts from the environment

Question 6

An Incident Responder wants to create a timeline for a recent incident using Syslog in addition to ATP for the

After Actions Report.

What are two reasons the responder should analyze the information using Syslog? (Choose two.)

Options:

A.

To have less raw data to analyze

B.

To evaluate the data, including information from other systems

C.

To access expanded historical data

D.

To determine what policy settings to modify in the Symantec Endpoint Protection Manager (SEPM)

E.

To determine the best cleanup method

Question 7

Which detection method identifies a file as malware after SEP has queried the file's reputation?

Options:

A.

Skeptic

B.

Vantage

C.

insight

D.

Cynic

Question 8

Which default port does ATP use to communicate with the Symantec Endpoint Protection Manager (SEPM)

web services?

Options:

A.

8446

B.

8081

C.

8014

D.

1433

Question 9

Which Advanced Threat Protection (ATP) component best isolates an infected computer from the network?

Options:

A.

ATP: Email

B.

ATP: Endpoint

C.

ATP: Network

D.

ATP: Roaming

Question 10

Which SEP technologies are used by ATP to enforce the blacklisting of files?

Options:

A.

Application and Device Control

B.

SONAR and Bloodhound

C.

System Lockdown and Download Insight

D.

Intrusion Prevention and Browser Intrusion Prevention

Question 11

What should an Incident Responder do to mitigate a false positive?

Options:

A.

Add to Whitelist

B.

Run an indicators of compromise (IOC) search

C.

Submit to VirusTotal

D.

Submit to Cynic

Question 12

ATP detects a threat phoning home to a command and control server and creates a new incident. The treat is NOT being detected by SEP, but the Incident Response team conducted an indicators of compromise (IOC) search for the machines that are contacting the malicious sites to gather more information.

Which step should the Incident Response team incorporate into their plan of action?

Options:

A.

Perform a healthcheck of ATP

B.

Create firewall rules in the Symantec Endpoint Protection Manager (SEPM) and the perimeter firewall

C.

Use ATP to isolate non-SEP protected computers to a remediation VLAN

D.

Rejoin the endpoints back to the network after completing a final virus scan

Question 13

An organization recently deployed ATP and integrated it with the existing SEP environment. During an outbreak, the Incident Response team used ATP to isolate several infected endpoints. However, one of the endpoints could NOT be isolated.

Which SEP protection technology is required in order to use the Isolate and Rejoin features in ATP?

Options:

A.

Intrusion Prevention

B.

Firewall

C.

SONAR

D.

Application and Device Control

Question 14

What is the role of Cynic within the Advanced Threat Protection (ATP) solution?

Options:

A.

Reputation-based security

B.

Event correlation

C.

Network detection component

D.

Detonation/sandbox

Page: 1 / 9
Total 90 questions