Symantec Related Exams
250-441 Exam
A customer has information about a malicious file that has NOT entered the network. The customer wants to know whether ATP is already aware of this threat without having to introduce a copy of the file to the infrastructure.
Which approach allows the customer to meet this need?
What occurs when an endpoint fails its Host Integrity check and is unable to remediate?
An Incident Responder runs an endpoint search on a client group with 100 endpoints. After one day, the
responder sees the results for 90 endpoints.
What is a possible reason for the search only returning results for 90 of 100 endpoints?