During a recent virus outbreak, an Incident Responder found that the Incident Response team was successful in identifying malicious domains that were communicating with the infected endpoints.
Which two options should the Incident Responder select to prevent endpoints from communicating with malicious domains? (Select two.)
Why is it important for an Incident Responder to copy malicious files to the ATP file store or create an image of the infected system during the Recovery phase?
Which two database attributes are needed to create a Microsoft SQL SEP database connection? (Choose
two.)
An Incident Responder is going to run an indicators of compromise (IOC) search on the endpoints and wants
to use operators in the expression.
Which tokens accept one or more of the available operators when building an expression?
An Incident Responder notices traffic going from an endpoint to an IRC channel. The endpoint is listed in an
incident. ATP is configured in TAP mode.
What should the Incident Responder do to stop the traffic to the IRC channel?
Which action should an Incident Responder take to remediate false positives, according to Symantec best
practices?
Why is it important for an Incident Responder to analyze an incident during the Recovery phase?
What is the minimum amount of RAM required for a virtual deployment of the ATP Manager in a production environment?
Which stage of an Advanced Persistent Threat (APT) attack do attackers map an organization’s defenses from the inside?
How does an attacker use a zero-day vulnerability during the Incursion phase?