Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

250-441 Symantec Administration of Symantec Advanced Threat Protection 3.0 Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Symantec 250-441 Administration of Symantec Advanced Threat Protection 3.0 certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 2
Total 96 questions

What are the prerequisite products needed when deploying ATP: Endpoint, Network, and Email?

A.

SEP and Symantec Messaging Gateway

B.

SEP, Symantec Email Security.cloud, and Security Information and Event Management (SIEM)

C.

SEP and Symantec Email Security.cloud

D.

SEP, Symantec Messaging Gateway, and Symantec Email Security.cloud

Which two (2 non-Symantec method for restricting traffic are available to the Incident response team?

A.

Temporarily disconnects the local network from the Internet.

B.

Create an Access Control List at the router to deny traffic.

C.

Analyze traffic using wire shark protocol analyzer to identify the source of the infection.

D.

Create a DNS a sinkhole server to block malicious traffic.

E.

Isolate computers so they are NOT compromised by infested computers.

An organization has five (5) shops with a few endpoints and a large warehouse where 98% of all computers are located. The shops are connected to the warehouse using leased lines and access internet through the warehouse network.

How should the organization deploy the network scanners to observe all inbound and outbound traffic based on Symantec best practices for Inline mode?

A.

Deploy a virtual network scanner at each shop

B.

Deploy a virtual network scanner at the warehouse and a virtual network scanner at each shop

C.

Deploy a physical network scanner at each shop

D.

Deploy a physical network scanner at the warehouse gateway

What is a benefit of using Microsoft SQL as the Symantec Endpoint Protection Manager (SEPM) database in regard to ATP?

A.

It allows for Microsoft Incident Responders to assist in remediation

B.

ATP can access the database using a log collector on the SEPM host

C.

It allows for Symantec Incident Responders to assist in remediation

D.

ATP can access the database without any special host system requirements

Which stage of an Advanced Persistent Threat (APT) attack do attackers break into an organization’s network

to deliver targeted malware?

A.

Incursion

B.

Discovery

C.

Capture

D.

Exfiltration

What does a Quarantine Firewall policy enable an ATP Administrator to do?

A.

Isolate a computer while it is manually being remediated

B.

Submit files to a Central Quarantine server

C.

Filter all traffic leaving the network

D.

Intercept all traffic entering the network

An ATP administrator is setting up an Endpoint Detection and Response connection.

Which type of authentication is allowed?

A.

Active Directory authentication

B.

SQL authentication

C.

LDAP authentication

D.

Symantec Endpoint Protection Manager (SEPM) authentication

Which level of privilege corresponds to each ATP account type?

Match the correct account type to the corresponding privileges.

An Incident Responder notices traffic going from an endpoint to an IRC channel. The endpoint is listed in an

incident. ATP is configured in TAP mode.

What should the Incident Responder do to stop the traffic to the IRC channel?

A.

Isolate the endpoint with a Quarantine Firewall policy

B.

Blacklist the IRC channel IP

C.

Blacklist the endpoint IP

D.

Isolate the endpoint with an application control policy

Refer to the exhibit. An Incident Responder wants to see what was detected on a specific day by the IPS engine.

Which item must the responder choose from the drop-down menu?

A.

Insight

B.

Cynic

C.

Vantage

D.

Blacklist

Which two ATP control points are able to report events that are detected using Vantage?

Enter the two control point names:

What occurs when an endpoint fails its Host Integrity check and is unable to remediate?

A.

The endpoint automatically switches to using a Compliance location, where a Compliance policy is applied to the computer.

B.

The endpoint automatically switches to using a System Lockdown location, where a System Lockdown

policy is applied to the computer.

C.

The endpoint automatically switches to using a Host Integrity location, where a Host Integrity policy is

applied to the computer.

D.

The endpoint automatically switches to using a Quarantine location, where a Quarantine policy is applied to the computer.

Which section of the ATP console should an ATP Administrator use to create blacklists and whitelists?

A.

Reports

B.

Settings

C.

Action Manager

D.

Policies

A customer has information about a malicious file that has NOT entered the network. The customer wants to know whether ATP is already aware of this threat without having to introduce a copy of the file to the infrastructure.

Which approach allows the customer to meet this need?

A.

Use the Cynic portal to check whether the MD5 hash triggers a detection from Cynic

B.

Use the ATP console to check whether the SHA-256 hash triggers a detection from Cynic

C.

Use the ATP console to check whether the MD5 hash triggers a detection from Cynic

D.

Use the Cynic portal to check whether the SHA-256 hash triggers a detection from Cynic

An ATP Administrator has deployed ATP: Network, Endpoint, and Email and now wants to ensure that all

connections are properly secured.

Which connections should the administrator secure with signed SSL certificates?

A.

ATP and the Symantec Endpoint Protection Manager (SEPM)

ATP and SEP clients

Web access to the GUI

B.

ATP and the Symantec Endpoint Protection Manager (SEPM)

ATP and SEP clients

ATP and Email Security.cloud

Web access to the GUI

C.

ATP and the Symantec Endpoint Protection Manager (SEPM)

D.

ATP and the Symantec Endpoint Protection Manager (SEPM)

Web access to the GUI

Which two user roles allow an Incident Responder to blacklist or whitelist files using the ATP manager?

(Choose two.)

A.

Administrator

B.

Controller

C.

User

D.

Incident Responder

E.

Root

An Incident Responder is going to run an indicators of compromise (IOC) search on the endpoints and wants

to use operators in the expression.

Which tokens accept one or more of the available operators when building an expression?

A.

All tokens

B.

Domainname, Filename, and Filehash

C.

Filename, Filehash, and Registry

D.

Domainname and Filename only

An organization is considering an ATP: Endpoint and Network deployment with multiple appliances.

Which form factor will be the most effective in terms of performance and costs?

A.

Virtual for management, physical for the network scanners and ATP: Endpoint

B.

Physical for management and ATP: Endpoint, virtual for the network scanners

C.

Virtual for management and ATP: Endpoint, physical for the network scanners

D.

Virtual for management, ATP: Endpoint, and the network scanners

An ATP administrator is setting up correlation with Email Security cloud.

What is the minimum Email Security cloud account privilege required?

A.

Standard User Role -Port

B.

Standard User Role - Service

C.

Standard User Role - Support

D.

Standard User Role - Full Access

An Incident Responder needs to remediate a group of endpoints but also wants to copy a potentially suspicious file to the ATP file store.

In which scenario should the Incident Responder copy a suspicious file to the ATP file store?

A.

The responder needs to analyze with Cynic

B.

The responder needs to isolate it from the network

C.

The responder needs to write firewall rules

D.

The responder needs to add the file to a whitelist

Page: 1 / 2
Total 96 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved