A) Policies page
B) Action Manager
C) Syslog
D) Incident Manager
E) Indicators of compromise (IOC) search
Correct Answer
verified
Multiple Choice
A) remediation attributes
B) sender correlations
C) status groups
D) custom attributes
Correct Answer
verified
Multiple Choice
A) Configure a SIEM feed from the portal to the ATP environment
B) Configure email reports on convictions
C) Submit false positive and false negative files
D) Query hashes
E) Submit hashes to Insight
Correct Answer
verified
Multiple Choice
A) uninstall passwords are restricted from containing the word 'Symantec'
B) the UninstallPwdKeyGenerator must be used to create an UninstallPasswordKey
C) the PGPsdk.dll file was missing when the key was created
D) the uninstall agent password needs to match the uninstall password key
Correct Answer
verified
Multiple Choice
A) Vector Machine Learning (VML)
B) Described Content Matching (DCM)
C) Indexed Document Matching (IDM)
D) Exact Data Matching (EDM)
Correct Answer
verified
Multiple Choice
A) Check the file system on both the servers.
B) Restart the Oracle instance to recognize the Quick I/O file.
C) Enable the Quick I/O on SrvB.
D) Enable the Quick I/O on SrvA.
E) Apply a new license for the cloned server, SrvB.
Correct Answer
verified
Multiple Choice
A) Capture
B) Incursion
C) Discovery
D) Exfiltration
Correct Answer
verified
Multiple Choice
A) The endpoint automatically switches to using a Compliance location, where a Compliance policy is applied to the computer.
B) The endpoint automatically switches to using a System Lockdown location, where a System Lockdown policy is applied to the computer.
C) The endpoint automatically switches to using a Host Integrity location, where a Host Integrity policy is applied to the computer.
D) The endpoint automatically switches to using a Quarantine location, where a Quarantine policy is applied to the computer.
Correct Answer
verified
Multiple Choice
A) Start the volumes in the disk group.
B) Format the disk group.
C) Recognize the disks using VxVM.
D) Create a new disk group.
Correct Answer
verified
Multiple Choice
A) ATP: Email
B) ATP: Endpoint
C) ATP: Network
D) ATP: Roaming
Correct Answer
verified
Multiple Choice
A) delete the incident completely
B) delete the original message and retain the incident
C) delete the incident and retain the original message
D) delete the incident and export incident details to .CSV file
E) delete all attachments or files and export incident to .XML file
Correct Answer
verified
Multiple Choice
A) SHA-256 hash
B) MD5 hash
C) MAC address
D) SHA-1 hash
E) Registry entry
Correct Answer
verified
Multiple Choice
A) By correcting the hardware failure and recovering the volume using the vxrecover command.
B) By checking the underlying hardware to recover the desired path.
C) By creating a new log plex and attaching it with the volume to restore RAID-5 logging to a RAID-5 volume.
D) By rebooting the computer.
Correct Answer
verified
Multiple Choice
A) Isolate the endpoint with a Quarantine Firewall policy
B) Blacklist the IRC channel IP
C) Blacklist the endpoint IP
D) Isolate the endpoint with an application control policy
Correct Answer
verified
Multiple Choice
A) Bypass the ProxySG's cache
B) Use DNS imputing
C) Perform lookups on internal servers
D) Perform reverse DNS lookups
Correct Answer
verified
Multiple Choice
A) incidents in which confidential content was removed from the body of an SMTP email
B) incidents in which an SMTP email was changed to include one or more SMTP headers
C) incidents in which digital rights were applied to SMTP email attachments containing confidential information
D) incidents in which confidential attachments were removed from an SMTP email
Correct Answer
verified
Multiple Choice
A) Enable SSL/TLS
B) Detect protocol
C) Authenticate-401
D) Forward client cert
Correct Answer
verified
Multiple Choice
A) Replace the disk
B) Restore the plexes on the volume
C) Restore the data on the volume
D) Start the hot-relocation process
Correct Answer
verified
Multiple Choice
A) Policy
B) DNS
C) CPU
D) Authentication
E) Memory
Correct Answer
verified
Multiple Choice
A) Ensure that storage attribute is a part of the disk group.
B) Ensure that storage attribute is a part of the plex.
C) Ensure that storage attribute is a part of the disk.
D) Ensure that storage attribute is a part of the volume.
Correct Answer
verified
Showing 81 - 100 of 409
Related Exams