Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

250-441 Exam Dumps - Administration of Symantec Advanced Threat Protection 3.0

Question # 4

A customer has information about a malicious file that has NOT entered the network. The customer wants to know whether ATP is already aware of this threat without having to introduce a copy of the file to the infrastructure.

Which approach allows the customer to meet this need?

A.

Use the Cynic portal to check whether the MD5 hash triggers a detection from Cynic

B.

Use the ATP console to check whether the SHA-256 hash triggers a detection from Cynic

C.

Use the ATP console to check whether the MD5 hash triggers a detection from Cynic

D.

Use the Cynic portal to check whether the SHA-256 hash triggers a detection from Cynic

Full Access
Question # 5

An Incident Responder has noticed that for the last month, the same endpoints have been involved with malicious traffic every few days. The network team also identified a large amount of bandwidth being used over P2P protocol.

Which two steps should the Incident Responder take to restrict the endpoints while maintaining normal use of the systems? (Choose two.)

A.

Report the users to their manager for unauthorized usage of company resources

B.

Blacklist the domains and IP associated with the malicious traffic

C.

Isolate the endpoints

D.

Blacklist the endpoints

E.

Find and blacklist the P2P client application

Full Access
Question # 6

A large company has 150,000 endpoints with 12 SEP sites across the globe. The company now wants to

implement ATP: Endpoint to improve their security. However, a consultant recently explained that the company needs to implement more than one ATP manager.

Why does the company need more than one ATP manager?

A.

An ATP manager can only connect to a SQL backend

B.

An ATP manager can only support 30,000 SEP clients

C.

An ATP manager can only support 10 SEP site connections.

D.

An ATP manager needs to be installed at each location where a Symantec Endpoint Protection Manager (SEPM) is located.

Full Access
Question # 7

Which attribute is required when configuring the Symantec Endpoint Protection Manager (SEPM) Log

Collector?

A.

SEPM embedded database name

B.

SEPM embedded database type

C.

SEPM embedded database version

D.

SEPM embedded database password

Full Access
Question # 8

What does a Quarantine Firewall policy enable an ATP Administrator to do?

A.

Isolate a computer while it is manually being remediated

B.

Submit files to a Central Quarantine server

C.

Filter all traffic leaving the network

D.

Intercept all traffic entering the network

Full Access
Question # 9

Which level of privilege corresponds to each ATP account type?

Match the correct account type to the corresponding privileges.

Full Access
Question # 10

Which two user roles allow an Incident Responder to blacklist or whitelist files using the ATP manager?

(Choose two.)

A.

Administrator

B.

Controller

C.

User

D.

Incident Responder

E.

Root

Full Access
Question # 11

Which prerequisite is necessary to extend the ATP: Network solution service in order to correlate email

detections?

A.

Email Security.cloud

B.

Web security.cloud

C.

Skeptic

D.

Symantec Messaging Gateway

Full Access
Question # 12

What is a benefit of using Microsoft SQL as the Symantec Endpoint Protection Manager (SEPM) database in regard to ATP?

A.

It allows for Microsoft Incident Responders to assist in remediation

B.

ATP can access the database using a log collector on the SEPM host

C.

It allows for Symantec Incident Responders to assist in remediation

D.

ATP can access the database without any special host system requirements

Full Access
Question # 13

An Incident Responder wants to investigate whether msscrt.pdf resides on any systems.

Which search query and type should the responder run?

A.

Database search filename “msscrt.pdf”

B.

Database search msscrt.pdf

C.

Endpoint search filename like msscrt.pdf

D.

Endpoint search filename =“msscrt.pdf”

Full Access
Question # 14

Which stage of an Advanced Persistent Threat (APT) attack does social engineering occur?

A.

Capture

B.

Incursion

C.

Discovery

D.

Exfiltration

Full Access