Symantec 250-441 - Administration of Symantec Advanced Threat Protection 3.0
Which stage of an Advanced Persistent Threat (APT) attack do attackers map an organization’s defenses from the inside?
Which endpoint detection method allows for information about triggered processes to be displayed in ATP?
An organization has five (5) shops with a few endpoints and a large warehouse where 98% of all computers are located. The shops are connected to the warehouse using leased lines and access internet through the warehouse network.
How should the organization deploy the network scanners to observe all inbound and outbound traffic based on Symantec best practices for Inline mode?
Which access credentials does an ATP Administrator need to set up a deployment of ATP: Endpoint, Network, and Email?
Which two database attributes are needed to create a Microsoft SQL SEP database connection? (Choose
two.)
Which section of the ATP console should an ATP Administrator use to create blacklists and whitelists?
Why is it important for an Incident Responder to review Related Incidents and Events when analyzing an
incident for an After Actions Report?
Which threat is an example of an Advanced Persistent Threat (APT)?