Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Symantec 250-441 Practice Exam with Questions & Answers

Questions 1

What is the role of Synapse within the Advanced Threat Protection (ATP) solution?

Options:
A.

Reputation-based security

B.

Event correlation

C.

Network detection component

D.

Detonation/sandbox

Symantec 250-441 Premium Access
Questions 2

Which endpoint detection method allows for information about triggered processes to be displayed in ATP?

Options:
A.

SONAR

B.

Insight

C.

System Lockdown

D.

Antivirus

Questions 3

Which action should an Incident Responder take to remediate false positives, according to Symantec best

practices?

Options:
A.

Blacklist

B.

Whitelist

C.

Delete file

D.

Submit file to Cynic

Questions 4

Which threat is an example of an Advanced Persistent Threat (APT)?

Options:
A.

Loyphish

B.

Aurora

C.

ZeroAccess

D.

Michelangelo

Questions 5

What does a Quarantine Firewall policy enable an ATP Administrator to do?

Options:
A.

Isolate a computer while it is manually being remediated

B.

Submit files to a Central Quarantine server

C.

Filter all traffic leaving the network

D.

Intercept all traffic entering the network

Questions 6

Which access credentials does an ATP Administrator need to set up a deployment of ATP: Endpoint, Network, and Email?

Options:
A.

Email Security.cloud credentials for email correlation, credentials for the Symantec Endpoint Protection Manager (SEPM) database, and a System Administrator login for the SEPM

B.

Active Directory login to the Symantec Endpoint Protection Manager (SEPM) database, and an Email Security.cloud login with full access

C.

Symantec Endpoint Protection Manager (SEPM) login and ATP: Email login with service permissions

D.

Credentials for the Symantec Endpoint Protection Manager (SEPM) database, and an administrator login for Symantec Messaging Gateway

Questions 7

While filling out the After Actions Report, an Incident Response Team noted that improved log monitoring could help detect future breaches.

What are two examples of how an organization can improve log monitoring to help detect future breaches? (Choose two.)

Options:
A.

Periodically log into the ATP manager and review only the Dashboard.

B.

Implement IT Analytics to create more flexible reporting.

C.

Dedicate an administrator to monitor new events as they flow into the ATP manager.

D.

Set email notifications in the ATP manager to message the Security team when a new incident is occurring.

E.

Implement Syslog to aggregate information from other systems, including ATP, and review log data in a single console.

Questions 8

Why is it important for an Incident Responder to copy malicious files to the ATP file store or create an image of the infected system during the Recovery phase?

Options:
A.

To have a copy of the file policy enforcement

B.

To test the effectiveness of the current assigned policy settings in the Symantec Endpoint Protection Manager (SEPM)

C.

To create custom IPS signatures

D.

To document and preserve any pieces of evidence associated with the incident

Questions 9

Which attribute is required when configuring the Symantec Endpoint Protection Manager (SEPM) Log

Collector?

Options:
A.

SEPM embedded database name

B.

SEPM embedded database type

C.

SEPM embedded database version

D.

SEPM embedded database password

Questions 10

Which stage of an Advanced Persistent Threat (APT) attack does social engineering occur?

Options:
A.

Capture

B.

Incursion

C.

Discovery

D.

Exfiltration

Exam Code: 250-441
Certification Provider: Symantec
Exam Name: Administration of Symantec Advanced Threat Protection 3.0
Last Update: Jul 11, 2025
Questions: 96