250-441試験無料問題集「Symantec Administration of Symantec Advanced Threat Protection 3.0 認定」

An Incident Responder has reviewed a STIX report and now wants to ensure that their systems have NOT been compromised by any of the reported threats.
Which two objects in the STIX report will ATP search against? (Choose two.)

What should an Incident Responder do to mitigate a false positive?

Which threat is an example of an Advanced Persistent Threat (APT)?

During a recent virus outlook, an Incident found that the incident Response team was successful in identifying malicious that were communicating with the infected endpoint.
Which two (2) options should be incident Responder select to prevent endpoints from communicating with malicious domains?

Which two steps must an Incident Responder take to isolate an infected computer in ATP? (Choose two.)

A customer has information about a malicious file that has NOT entered the network. The customer wants to know whether ATP is already aware of this threat without having to introduce a copy of the file to the infrastructure.
Which approach allows the customer to meet this need?

Which section of the ATP console should an ATP Administrator use to evaluate prioritized threats within the environment?

How should an ATP Administrator configure Endpoint Detection and Response according to Symantec best practices for a SEP environment with more than one domain?

Malware is currently spreading through an organization's network. An Incident Responder sees some detections in SEP, but there is NOT an apparent relationship between them.
How should the responder look for the source of the infection using ATP?

Which two (2 non-Symantec method for restricting traffic are available to the Incident response team?