An Incident Responder launches a search from ATP for a file hash. The search returns the results
immediately. The responder reviews the Symantec Endpoint Protection Manager (SEPM) command status and
does NOT see an indicators of compromise (IOC) search command.
How is it possible that the search returned results?
An ATP Administrator has deployed ATP: Network, Endpoint, and Email and now wants to ensure that all
connections are properly secured.
Which connections should the administrator secure with signed SSL certificates?
Which two questions can an Incident Responder answer when analyzing an incident in ATP? (Choose two.)
An Incident Responder needs to remediate a group of endpoints but also wants to copy a potentially suspicious file to the ATP file store.
In which scenario should the Incident Responder copy a suspicious file to the ATP file store?
A large company has 150,000 endpoints with 12 SEP sites across the globe. The company now wants to
implement ATP: Endpoint to improve their security. However, a consultant recently explained that the company needs to implement more than one ATP manager.
Why does the company need more than one ATP manager?
What is the role of Cynic within the Advanced Threat Protection (ATP) solution?
Which attribute is required when configuring the Symantec Endpoint Protection Manager (SEPM) Log
Collector?
An organization recently deployed ATP and integrated it with the existing SEP environment. During an outbreak, the Incident Response team used ATP to isolate several infected endpoints. However, one of the endpoints could NOT be isolated.
Which SEP protection technology is required in order to use the Isolate and Rejoin features in ATP?