A customer has information about a malicious file that has NOT entered the network. The customer wants to know whether ATP is already aware of this threat without having to introduce a copy of the file to the infrastructure.
Which approach allows the customer to meet this need?
Which access credentials does an ARP Administrator need to set up a deployment of ATP: Endpoint , Network and Email?
During a recent virus outlook, an Incident found that the incident Response team was successful in identifying malicious that were communicating with the infected endpoint.
Which two (2) options should be incident Responder select to prevent endpoints from communicating with malicious domains?
What occurs when an endpoint fails its Host Integrity check and is unable to remediate?
Which stage of an Advanced Persistent Threat (APT) attack do attackers send information back to the home base?
Which two questions can an Incident Responder answer when analyzing an incident in ATP? (Choose two.)
Which stage of an Advanced Persistent Threat (APT) attack do attackers map an organization’s defenses from the inside?
What is a benefit of using Microsoft SQL as the Symantec Endpoint Protection Manager (SEPM) database in regard to ATP?
Which stage of an Advanced Persistent Threat (APT) attack do attackers break into an organization’s network
to deliver targeted malware?
An Incident Responder runs an endpoint search on a client group with 100 endpoints. After one day, the
responder sees the results for 90 endpoints.
What is a possible reason for the search only returning results for 90 of 100 endpoints?
Which prerequisite is necessary to extend the ATP: Network solution service in order to correlate email
detections?
Which best practice does Symantec recommend with the Endpoint Detection and Response feature?
How does an attacker use a zero-day vulnerability during the Incursion phase?
An Incident Responder needs to remediate a group of endpoints but also wants to copy a potentially suspicious file to the ATP file store.
In which scenario should the Incident Responder copy a suspicious file to the ATP file store?