250-441試験無料問題集「Symantec Administration of Symantec Advanced Threat Protection 3.0 認定」

Which default port does ATP use to communicate with the Symantec Endpoint Protection Manager (SEPM) web services?

What is the earliest stage at which a SQL injection occurs during an Advanced Persistent Threat (APT) attack?

Which two database attributes are needed to create a Microsoft SQL SEP database connection? (Choose two.)

How can an Incident Responder generate events for a site that was identified as malicious but has NOT triggered any events or incidents in ATP?

Which final steps should an Incident Responder take before using ATP to rejoin a remediated endpoint to the network, according to Symantec best practices?

Why is it important for an Incident Responder to review Related Incidents and Events when analyzing an incident for an After Actions Report?

An Incident Responder has reviewed a STIX report and now wants to ensure that their systems have NOT been compromised by any of the reported threats.
Which two objects in the STIX report will ATP search against? (Choose two.)

An ATP administrator is setting up correlation with Email Security cloud.
What is the minimum Email Security cloud account privilege required?

An Incident Responder wants to use a STIX file to run an indicate of components (IOC) search.
Which format must the administrator use for the file?

An organization has five (5) shops with a few endpoints and a large warehouse where 98% of all computers are located. The shops are connected to the warehouse using leased lines and access internet through the warehouse network.
How should the organization deploy the network scanners to observe all inbound and outbound traffic based on Symantec best practices for Inline mode?