An organization has several Symantec Endpoint Protection Management (SEPM) Servers without access to the internet. The SEPM can only run LiveUpdate within a specified "maintenance window" outside of business hours.
What content distribution method should the organization utilize?
For organizations with Symantec Endpoint Protection Manager (SEPM) servers that do not have internet access and require updates only within a specific maintenance window, the JDB file method is an effective solution:
Offline Content Distribution: JDB files can be downloaded on an internet-connected device and then manually transferred to SEPM, allowing it to update content offline.
Flexible Timing: Since JDB files can be applied during the maintenance window, this method adheres to time restrictions, avoiding disruption during business hours.
Using JDB files ensures that SEPM remains updated in environments with limited connectivity or strict operational schedules.
In what order should an administrator configure the integration between SEDR and Symantec Endpoint Protection in order to maximize their benefits?
To integrate Symantec Endpoint Detection and Response (SEDR) with Symantec Endpoint Protection (SEP) effectively, the recommended configuration order is ECC, Synapse, then Insight Proxy.
Order of Configuration:
ECC (Endpoint Communication Channel): This establishes the communication layer for SEDR and SEP integration, which is foundational for data exchange.
Synapse: This integration uses data from ECC to correlate threat intelligence and provide context to detected threats.
Insight Proxy: Configured last, Insight Proxy adds cloud-based file reputation lookups, enhancing detection capabilities with reputation scoring.
Why This Order is Effective:
Each component builds on the previous one, maximizing the value of integration by ensuring that foundational communication (ECC) is established before adding Synapse correlation and Insight Proxy reputation data.
On which platform is LiveShell available?
LiveShell is a Symantec tool available across multiple platforms, including Windows, Linux, and Mac. It enables administrators to open a live command-line shell on endpoints, providing remote troubleshooting and response capabilities regardless of the operating system.
Cross-Platform Availability:
LiveShell's cross-platform support ensures that administrators can respond to incidents, troubleshoot issues, and run commands on endpoints running Windows, Linux, or macOS.
Use Cases for LiveShell:
This tool is useful for incident response teams needing quick access to endpoints for commands or scripts, which helps to manage and mitigate threats across diverse environments.
Which term or expression is utilized when adversaries leverage existing tools in the environment?
Living off the land (LOTL) is a tactic where adversaries leverage existing tools and resources within the environment for malicious purposes. This approach minimizes the need to introduce new, detectable malware, instead using trusted system utilities and software already present on the network.
Characteristics of Living off the Land:
LOTL attacks make use of built-in utilities, such as PowerShell or Windows Management Instrumentation (WMI), to conduct malicious operations without triggering traditional malware defenses.
This method is stealthy and often bypasses signature-based detection, as the tools used are legitimate components of the operating system.
Why Other Options Are Incorrect:
Opportunistic attack (Option A) refers to attacks that exploit easily accessible vulnerabilities rather than using internal resources.
File-less attack (Option B) is a broader category that includes but is not limited to LOTL techniques.
Script kiddies (Option C) describes inexperienced attackers who use pre-made scripts rather than sophisticated, environment-specific tactics.
A user is unknowingly about to connect to a malicious website and download a known threat within a .rar file. All Symantec Endpoint Protection technologies are installed on the client's system.
In which feature set order must the threat pass through to successfully infect the system?
When a user attempts to connect to a malicious website and download a known threat, the threat passes through SEP's Firewall, Intrusion Prevention System (IPS), and Download Insight in that order. This layered approach helps prevent threats at different stages of the attack chain.
Threat Path Through SEP Protection Features:
Firewall: Blocks or allows network connections based on policy, filtering initial traffic to potentially dangerous sites.
IPS: Monitors and blocks known patterns of malicious activity, such as suspicious URLs or network behavior, providing another layer of defense.
Download Insight: Analyzes file reputation and blocks known malicious files based on reputation data, which is especially effective for files within archives like .rar files.
Why This Order is Effective:
Each layer serves as a checkpoint: the Firewall controls network access, IPS scans for malicious traffic, and Download Insight assesses files for risk upon download, ensuring thorough protection.
Why Other Orders Are Incorrect:
Options with Download Insight or IPS preceding the Firewall do not match SEP's operational order of defense.
Adolph
12 days agoGeoffrey
15 days agoNoelia
28 days agoMagnolia
1 months agoLachelle
2 months agoBilly
2 months agoVeronika
2 months agoBo
3 months agoAudry
3 months agoKimberlie
3 months agoRasheeda
3 months agoLawanda
3 months agoRemona
4 months agoShawnta
4 months agoBrett
4 months agoMarya
4 months agoRessie
4 months agoRamonita
5 months agoErasmo
5 months agoTiara
5 months agoGary
5 months agoZona
5 months ago