ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 51 - JN0-636 discussion

Report
Export

Exhibit

A.
The highlighted incident (arrow) shown in the exhibit shows a progression level of "Download" in the kill chain.What are two appropriate mitigation actions for the selected incident? (Choose two.)
Answers
A.
The highlighted incident (arrow) shown in the exhibit shows a progression level of "Download" in the kill chain.What are two appropriate mitigation actions for the selected incident? (Choose two.)
B.
Immediate response required: Block malware IP addresses (download server or CnC server)
Answers
B.
Immediate response required: Block malware IP addresses (download server or CnC server)
C.
Immediate response required: Wipe infected endpoint hosts.
Answers
C.
Immediate response required: Wipe infected endpoint hosts.
D.
Immediate response required: Deploy IVP integration (if configured) to confirm if the endpoint has executed the malware and is infected.
Answers
D.
Immediate response required: Deploy IVP integration (if configured) to confirm if the endpoint has executed the malware and is infected.
E.
Not an urgent action: Use IVP to confirm if machine is infected.
Answers
E.
Not an urgent action: Use IVP to confirm if machine is infected.
Suggested answer: A, C

Explanation:

The appropriate mitigation actions for the selected incident are to block malware IP addresses (download server or CnC server) and to deploy IVP integration (if configured) to confirm if the endpoint has executed the malware and is infected. This is because the incident shows a progression level of "Download" in the kill chain, which means that the malware has been downloaded and is likely to be executed. Blocking the malware IP addresses can prevent further communication with the malicious server and stop the malware from receiving commands or exfiltrating data. Deploying IVP integration can help verify the infection status of the endpoint and provide additional information about the malware behavior and impact. IVP integration is an optional feature that allows the ATP Appliance to interact with third-party endpoint security solutions such as Carbon Black, Cylance, and CrowdStrike. Reference:

Advanced Threat Prevention Appliance Solution Brief

Advanced Threat Prevention Appliance Datasheet

[Advanced Threat Prevention Appliance Mitigation Actions]

[Advanced Threat Prevention Appliance IVP Integration]

asked 18/09/2024
Nosh Shah
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first