Symantec 250-441 - Administration of Symantec Advanced Threat Protection 3.0
Which two widgets can an Incident Responder use to isolate breached endpoints from the Incident details
page? (Choose two.)
Which action should an Incident Responder take to remediate false positives, according to Symantec best
practices?
Which stage of an Advanced Persistent Threat (APT) attack do attackers send information back to the home base?
An organization is considering an ATP: Endpoint and Network deployment with multiple appliances.
Which form factor will be the most effective in terms of performance and costs?
Why is it important for an Incident Responder to copy malicious files to the ATP file store or create an image of the infected system during the Recovery phase?
What is the role of Vantage within the Advanced Threat Protection (ATP) solution?
Which Advanced Threat Protection (ATP) component best isolates an infected computer from the network?
What does a Quarantine Firewall policy enable an ATP Administrator to do?
What is a benefit of using Microsoft SQL as the Symantec Endpoint Protection Manager (SEPM) database in regard to ATP?
Which two questions can an Incident Responder answer when analyzing an incident in ATP? (Choose two.)