What is causing this issue?

An Incident Responder discovers an incident where all systems are infected with a file that has the same name and different hash. As a result, the organism viewhas multiple entries for the malicious file. What is causing this issue? A. This is a polymorphic threat B. This is a DDoS attack C. The file has […]

Read More

How is it possible that the search returned results?

An Incident Responder launches a search from ATP for a file hash. The search returns the results immediately. The responder reviews the Symantec EndpointProtection Manager (SEPM) command status and does NOT see an indicators of compromise (IOC) search command. How is it possible that the search returned results? A. The search runs and returns results […]

Read More

Which connections should the administrator secure with signed SSL certificates?

An ATP Administrator has deployed ATP: Network, Endpoint, and Email and now wants to ensure that all connections are properly secured. Which connections should the administrator secure with signed SSL certificates? A. ATP and the Symantec Endpoint Protection Manager (SEPM) ATP and SEP clientsWeb access to the GUI B. ATP and the Symantec Endpoint Protection […]

Read More