Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

250-441 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

250-441 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Administration of Symantec Advanced Threat Protection 3.0
  • Last Update: May 1, 2024
  • Questions and Answers: 96
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

250-441 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

250-441 Practice Exam Questions with Answers Administration of Symantec Advanced Threat Protection 3.0 Certification

Question # 6

Which threat is an example of an Advanced Persistent Threat (APT)?

A.

Loyphish

B.

Aurora

C.

ZeroAccess

D.

Michelangelo

Full Access
Question # 7

What is the second stage of an Advanced Persistent Threat (APT) attack?

A.

Exfiltration

B.

Incursion

C.

Discovery

D.

Capture

Full Access
Question # 8

An Incident Responder wants to use a STIX file to run an indicate of components (IOC) search.

Which format must the administrator use for the file?

A.

.csv

B.

.xml

C.

.mht

D.

.html

Full Access
Question # 9

An Incident Responder observers and incident with multiple malware downloads from a malicious domain. The domain in question belongs to one of the organization suppliers. The organization to the site to continue placing orders. Network is configured in Inline Block mode?

How should the Incident responder proceed?

A.

Whitelist the domain and close the incident as a false positive

B.

Identify the pieces of malware and blacklist them, then notify the supplier

C.

Blacklist the domain and IP of the attacking site

D.

Notify the supplier and block the site on the external firewall

Full Access
Question # 10

Which threat is an example of an Advanced Persistent Threat (APT)?

A.

Zeus

B.

Melissa

C.

Duqu

D.

Code Red

Full Access
Question # 11

What should an Incident Responder do to mitigate a false positive?

A.

Add to Whitelist

B.

Run an indicators of compromise (IOC) search

C.

Submit to VirusTotal

D.

Submit to Cynic

Full Access
Question # 12

Which detection method identifies a file as malware after SEP has queried the file's reputation?

A.

Skeptic

B.

Vantage

C.

insight

D.

Cynic

Full Access
Question # 13

Which section of the ATP console should an ATP Administrator use to create blacklists and whitelists?

A.

Reports

B.

Settings

C.

Action Manager

D.

Policies

Full Access
Question # 14

An ATP Administrator set up ATP: Network in TAP mode and has placed URLs on the blacklist.

What will happen when a user attempts to access one of the blacklisted URLs?

A.

Access to the website is blocked by the network scanner but an event is NOT generated

B.

Access to the website is blocked by the network scanner and a network event is generated

C.

Access to the website is allowed by the network scanner but blocked by ATP: Endpoint and an endpoint event is generated

D.

Access to the website is allowed by the network scanner but a network event is generated

Full Access