1.
Why is it important for an Incident Responder to analyze an incident during the Recovery phase?
2.
How does an attacker use a zero-day vulnerability during the Incursion phase?
3.
Why is it important for an Incident Responder to review Related Incidents and Events when analyzing an incident for an After Actions Report?
4.
What is the role of Cynic within the Advanced Threat Protection (ATP) solution?
5.
Which section of the ATP console should an ATP Administrator use to create blacklists and whitelists?
6.
How should an ATP Administrator configure Endpoint Detection and Response according to Symantec best practices for a SEP environment with more than one domain?
7.
Where can an Incident Responder view Cynic results in ATP?
8.
An Incident Responder wants to investigate whether msscrt.pdf resides on any systems. Which search query and type should the responder run?
9.
What is the earliest stage at which a SQL injection occurs during an Advanced Persistent Threat (APT) attack?
10.
What occurs when an endpoint fails its Host Integrity check and is unable to remediate?