Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Symantec Certified Specialist 250-441 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam 250-441 Premium Access

View all detail and faqs for the 250-441 exam


404 Students Passed

88% Average Score

91% Same Questions
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

While filling out the After Actions Report, an Incident Response Team noted that improved log monitoring could help detect future breaches.

What are two examples of how an organization can improve log monitoring to help detect future breaches? (Choose two.)

Options:

A.

Periodically log into the ATP manager and review only the Dashboard.

B.

Implement IT Analytics to create more flexible reporting.

C.

Dedicate an administrator to monitor new events as they flow into the ATP manager.

D.

Set email notifications in the ATP manager to message the Security team when a new incident is occurring.

E.

Implement Syslog to aggregate information from other systems, including ATP, and review log data in a single console.

Questions # 2:

During a recent virus outlook, an Incident found that the incident Response team was successful in identifying malicious that were communicating with the infected endpoint.

Which two (2) options should be incident Responder select to prevent endpoints from communicating with malicious domains?

Options:

A.

Use the isolation command in ATP to move endpoint to quarantine network.

B.

Blacklist suspicious domain in the ATP manager.

C.

Deploy a high-Security antivirus and Antispyware policy in the Symantec Endpoint protection Manager (SEPM.)

D.

Create a firewall rule in the Symantec Endpoints Protection Manager (SEPM) or perimeter firewall that blocks

E.

traffic to the domain.

F.

Run a full system scan on all endpoints

Questions # 3:

Where can an Incident Responder view Cynic results in ATP?

Options:

A.

Events

B.

Dashboard

C.

File Details

D.

Incident Details

Questions # 4:

Which two user roles allow an Incident Responder to blacklist or whitelist files using the ATP manager?

(Choose two.)

Options:

A.

Administrator

B.

Controller

C.

User

D.

Incident Responder

E.

Root

Questions # 5:

An Incident Responder wants to create a timeline for a recent incident using Syslog in addition to ATP for the

After Actions Report.

What are two reasons the responder should analyze the information using Syslog? (Choose two.)

Options:

A.

To have less raw data to analyze

B.

To evaluate the data, including information from other systems

C.

To access expanded historical data

D.

To determine what policy settings to modify in the Symantec Endpoint Protection Manager (SEPM)

E.

To determine the best cleanup method

Questions # 6:

What is the role of Synapse within the Advanced Threat Protection (ATP) solution?

Options:

A.

Reputation-based security

B.

Event correlation

C.

Network detection component

D.

Detonation/sandbox

Questions # 7:

In which scenario would it be beneficial for an organization to eradicate a threat from the environment by deleting it?

Options:

A.

The Incident Response team is identifying the scope of the infection and is gathering a list of infected systems.

B.

The Incident Response team is reviewing detections in the risk logs and assigning a High-Security Antivirus and Antispyware policy in the Symantec Endpoint Protection Manager (SEPM).

C.

The Incident Response team completed their analysis of the threat and added it to a blacklist.

D.

The Incident Response team is analyzing the file to determine if it is a threat or a false positive.

Questions # 8:

Which access credentials does an ATP Administrator need to set up a deployment of ATP: Endpoint, Network, and Email?

Options:

A.

Email Security.cloud credentials for email correlation, credentials for the Symantec Endpoint Protection Manager (SEPM) database, and a System Administrator login for the SEPM

B.

Active Directory login to the Symantec Endpoint Protection Manager (SEPM) database, and an Email Security.cloud login with full access

C.

Symantec Endpoint Protection Manager (SEPM) login and ATP: Email login with service permissions

D.

Credentials for the Symantec Endpoint Protection Manager (SEPM) database, and an administrator login for Symantec Messaging Gateway

Questions # 9:

Which action should an Incident Responder take to remediate false positives, according to Symantec best

practices?

Options:

A.

Blacklist

B.

Whitelist

C.

Delete file

D.

Submit file to Cynic

Questions # 10:

How can an Incident Responder generate events for a site that was identified as malicious but has NOT

triggered any events or incidents in ATP?

Options:

A.

Assign a High-Security Antivirus and Antispyware policy in the Symantec Endpoint Protection Manager

(SEPM).

B.

Run an indicators of compromise (IOC) search in ATP manager.

C.

Create a firewall rule in the Symantec Endpoint Protection Manager (SEPM) or perimeter firewall that

blocks traffic to the domain.

D.

Add the site to a blacklist in ATP manager.

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.