What is the second stage of an Advanced Persistent Threat (APT) attack?
A. Exfiltration
B. Incursion
C. Discovery
D. Capture
How does an attacker use a zero-day vulnerability during the Incursion phase?
A. To perform a SQL injection on an internal server
B. To extract sensitive information from the target
C. To perform network discovery on the target
D. To deliver malicious code that breaches the target
Why is it important for an Incident Responder to review Related Incidents and Events when analyzing an incident for an After Actions Report?
A. It ensures that the Incident is resolved, and the responder can clean up the infection.
B. It ensures that the Incident is resolved, and the responder can determine the best remediation method.
C. It ensures that the Incident is resolved, and the threat is NOT continuing to spread to other parts of the environment.
D. It ensures that the Incident is resolved, and the responder can close out the incident in the ATP manager.
What is the earliest stage at which a SQL injection occurs during an Advanced Persistent Threat (APT) attack?
A. Exfiltration
B. Incursion
C. Capture
D. Discovery
Which prerequisite is necessary to extend the ATP: Network solution service in order to correlate email detections?
A. Email Security.cloud
B. Web security.cloud
C. Skeptic
D. Symantec Messaging Gateway
Which Advanced Threat Protection (ATP) component best isolates an infected computer from the network?
A. ATP: Email
B. ATP: Endpoint
C. ATP: Network
D. ATP: Roaming
An Incident Responder has reviewed a STIX report and now wants to ensure that their systems have NOT been compromised by any of the reported threats.
Which two objects in the STIX report will ATP search against? (Choose two.)
A. SHA-256 hash
B. MD5 hash
C. MAC address
D. SHA-1 hash
E. Registry entry
An ATP administrator is setting up an Endpoint Detection and Response connection.
Which type of authentication is allowed?
A. Active Directory authentication
B. SQL authentication
C. LDAP authentication
D. Symantec Endpoint Protection Manager (SEPM) authentication
What should an Incident Responder do to mitigate a false positive?
A. Add to Whitelist
B. Run an indicators of compromise (IOC) search
C. Submit to VirusTotal
D. Submit to Cynic
Which detection method identifies a file as malware after SEP has queried the file's reputation?
A. Skeptic
B. Vantage
C. Insight
D. Cynic