Where can an Incident Responder view Cynic results in ATP?
Where can an Incident Responder view Cynic results in ATP? A. Events B. Dashboard C. File Details D. Incident Details
Where can an Incident Responder view Cynic results in ATP? A. Events B. Dashboard C. File Details D. Incident Details
What is the main constraint an ATP Administrator should consider when choosing a network scanner model? A. Throughput B. Bandwidth C. Link speed D. Number of users
An Incident Responder wants to run a database search that will list all client named starting with SYM. Which syntax should the responder use? A. hostname like "SYM" B. hostname "SYM" C. hostname "SYM*" D. hostname like "SYM*"
Which best practice does Symantec recommend with the Endpoint Detection and Response feature? A. Create a unique Cynic account to provide to ATP B. Create a unique Symantec Messaging Gateway account to provide to ATP C. Create a unique Symantec…
What is the role of Cynic within the Advanced Threat Protection (ATP) solution? A. Reputation-based security B. Event correlation C. Network detection component D. Detonation/sandbox
Which section of the ATP console should an ATP Administrator use to create blacklists and whitelists? A. Reports B. Settings C. Action Manager D. Policies
How should an ATP Administrator configure Endpoint Detection and Response according to Symantec best practices for a SEP environment with more than one domain? A. Create a unique Symantec Endpoint Protection Manager (SEPM) domain for ATP B. Create an ATP…
Which attribute is required when configuring the Symantec Endpoint Protection Manager (SEPM) Log Collector? A. SEPM embedded database name B. SEPM embedded database type C. SEPM embedded database version D. SEPM embedded database password
Why is it important for an Incident Responder to review Related Incidents and Events when analyzing an incident for an After Actions Report? A. It ensures that the Incident is resolved, and the responder can clean up the infection. B.…
How does an attacker use a zero-day vulnerability during the Incursion phase? A. To perform a SQL injection on an internal server B. To extract sensitive information from the target C. To perform network discovery on the target D. To…