An Incident Responder launches a search from ATP for a file hash. The search returns the results
immediately. The responder reviews the Symantec Endpoint Protection Manager (SEPM) command status and
does NOT see an indicators of compromise (IOC) search command.
How is it possible that the search returned results?
In which scenario should an Incident Responder manually submit a file to the Cynic portal?
Which stage of an Advanced Persistent Threat (APT) attack do attackers map an organization’s defenses from the inside?
What are two policy requirements for using the Isolate and Rejoin features in ATP? (Choose two.)
In which two locations should an Incident Responder gather data for an After Actions Report in ATP? (Choose
two.)
An Incident Responder observers and incident with multiple malware downloads from a malicious domain. The domain in question belongs to one of the organization suppliers. The organization to the site to continue placing orders. Network is configured in Inline Block mode?
How should the Incident responder proceed?
A customer has information about a malicious file that has NOT entered the network. The customer wants to know whether ATP is already aware of this threat without having to introduce a copy of the file to the infrastructure.
Which approach allows the customer to meet this need?
What is the role of Cynic within the Advanced Threat Protection (ATP) solution?
An Incident Responder wants to run a database search that will list all client named starting with SYM.
Which syntax should the responder use?
What is the earliest stage at which a SQL injection occurs during an Advanced Persistent Threat (APT) attack?