Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Broadcom Exam 250-580 Topic 2 Question 14 Discussion

Actual exam question for Broadcom's 250-580 exam
Question #: 14
Topic #: 2
[All 250-580 Questions]

An Incident Responder has determined that an endpoint is compromised by a malicious threat. What SEDR feature would be utilized first to contain the threat?

Show Suggested Answer Hide Answer
Suggested Answer: C

When an Incident Responder determines that an endpoint is compromised, the first action to contain the threat is to use the Isolation feature in Symantec Endpoint Detection and Response (SEDR). Isolation effectively disconnects the affected endpoint from the network, thereby preventing the malicious threat from communicating with other systems or spreading within the network environment. This feature enables the responder to contain the threat swiftly, allowing further investigation and remediation steps to be conducted without risk of lateral movement by the attacker.


Contribute your Thoughts:

Kasandra
1 days ago
Isolation is the name of the game! Contain that threat before it unleashes its inner Hulk.
upvoted 0 times
...
Johnathon
3 days ago
File Deletion? What is this, the dark ages? Let's be more proactive with Isolation.
upvoted 0 times
...
Pamella
4 days ago
I see your point, Elli. Incident Manager can also help in managing and tracking the incident.
upvoted 0 times
...
Elli
5 days ago
But wouldn't using the Incident Manager be more effective in this situation?
upvoted 0 times
...
My
6 days ago
I agree with Pamella, isolating the endpoint can help contain the threat.
upvoted 0 times
...
Pamella
11 days ago
I think the first step would be to isolate the compromised endpoint.
upvoted 0 times
...
Annita
1 months ago
Incident Manager? Nah, that's for the big boss. We need something more hands-on, like Isolation.
upvoted 0 times
...
Idella
1 months ago
Hmm, I'd say Endpoint Activity Recorder. Sounds like the perfect tool to gather intel on the incident.
upvoted 0 times
Hana
14 days ago
I think Isolation would be the best option to contain the threat.
upvoted 0 times
...
...
Edna
2 months ago
Isolation is the way to go! Gotta contain that threat before it spreads like wildfire.
upvoted 0 times
Whitney
20 days ago
Once the endpoint is isolated, we can investigate further to determine the extent of the compromise.
upvoted 0 times
...
Bobbye
25 days ago
I agree, isolating the endpoint is crucial to prevent further damage.
upvoted 0 times
...
Marvel
1 months ago
Using the Isolation feature first is crucial in situations like this.
upvoted 0 times
...
Benton
1 months ago
I agree, isolating the endpoint can prevent the threat from spreading further.
upvoted 0 times
...
Paris
1 months ago
Isolation is definitely the best option to contain the threat.
upvoted 0 times
...
Brande
1 months ago
Isolation is definitely the best option to contain the threat.
upvoted 0 times
...
...

Save Cancel