An organization has a virtualized environment that is utilized by a group of Developers for testing. What feature can this organization utilize to optimize performance when running scheduled scans?
Answer : B
In virtualized environments, Symantec Endpoint Protection (SEP) offers Shared Insight Cache (SIC) as a feature to improve performance by reducing redundant scanning.
Shared Insight Cache Functionality:
SIC allows SEP clients in a virtual environment to share scan results. Once a file is scanned and deemed safe, that result is cached and shared across other SEP clients, preventing duplicate scans of the same file on different virtual machines (VMs).
This caching mechanism is especially beneficial in environments where multiple VMs frequently use identical files, such as software libraries or system files.
Optimized Performance:
By reducing repetitive scanning, SIC minimizes CPU and disk usage, allowing virtualized environments to maintain performance even during scheduled scans.
This approach is ideal for development and testing environments, where VM efficiency is crucial for productivity.
Why Other Options Are Less Suitable:
Disabling ELAM or adjusting Auto-Protect settings may reduce security or have limited impact on overall performance in a virtualized environment.
Randomizing scheduled scans could help distribute resource load but does not prevent redundant scans across VMs.
In which phase of the MITRE framework would attackers exploit faults in software to directly tamper with system memory?
Answer : B
In the MITRE ATT&CK framework, the Execution phase encompasses techniques that attackers use to run malicious code on a target system. This includes methods for exploiting software vulnerabilities to tamper directly with system memory, often by triggering unintended behaviors such as arbitrary code execution or modifying memory contents to inject malware.
Execution Phase Overview:
The Execution phase is specifically focused on methods that enable an attacker to run unauthorized code. This might involve exploiting software faults to manipulate memory and bypass defenses.
Memory Exploit Relevance:
Memory exploits, such as buffer overflows or code injections, fall into this phase as they allow attackers to gain control over system processes by tampering with memory.
These exploits can directly manipulate memory, enabling attackers to execute arbitrary instructions, thereby gaining unauthorized control over the application or even the operating system.
Why Other Phases Are Incorrect:
Defense Evasion involves hiding malicious activities rather than direct execution.
Exfiltration pertains to the theft of data from a system.
Discovery is focused on gathering information about the system or network, not executing code.
Which technology can prevent an unknown executable from being downloaded through a browser session?
Answer : B
Symantec Insight technology can prevent the download of unknown executables through a browser session by leveraging a cloud-based reputation service. Insight assesses the reputation of files based on data collected from millions of endpoints, blocking downloads that are unknown or have a low reputation. This technology is particularly effective against zero-day threats or unknown files that do not yet have established signatures.
What version number is assigned to a duplicated policy?
Answer : D
When a policy is duplicated in Symantec Endpoint Protection (SEP), the duplicated policy is assigned a version number of 'One'. This means that the new policy starts fresh with a version number of 1, separate from the original policy's version history. The SEP system uses this new version number to track any subsequent changes to the duplicated policy independently of the original.
An administrator notices that some entries list that the Risk was partially removed. The administrator needs to determine whether additional steps are necessary to remediate the threat.
Where in the Symantec Endpoint Protection Manager console can the administrator find additional information on the risk?
Answer : A
To gather more details about threats that were only partially removed, an administrator should consult the Risk log in the Symantec Endpoint Protection Manager (SEPM) console. The Risk log provides comprehensive information about detected threats, their removal status, and any remediation actions taken. By examining these logs, the administrator can determine if additional steps are required to fully mitigate the threat, ensuring that the endpoint is entirely secure and free of residual risks.
A Symantec Endpoint Protection (SEP) administrator receives multiple reports that machines are experiencing performance issues. The administrator discovers that the reports happen at about the same time as the scheduled LiveUpdate.
Which setting should the SEP administrator configure to minimize I/O when LiveUpdate occurs?
Answer : A
To minimize I/O impact when LiveUpdate occurs, the LiveUpdate schedule should be adjusted. Here's why this solution is effective:
Reduced System Impact During Peak Hours: By scheduling LiveUpdate during off-peak times, system resources are freed up during high-usage periods, reducing the likelihood of performance issues.
Efficient Resource Allocation: Adjusting the schedule allows LiveUpdate to run at times when endpoint resources are less likely to be needed for user activities, minimizing its impact on performance.
Maintaining Regular Updates: This approach ensures that updates still occur regularly without impacting endpoint performance during work hours.
This method is optimal for managing resource load and maintaining smooth performance during scheduled updates.
What Threat Defense for Active Directory feature disables a process's ability to spawn another process, overwrite a part of memory, run recon commands, or communicate to the network?
Answer : B
The Process Protection feature in Threat Defense for Active Directory (TDAD) prevents processes from performing certain actions that could indicate malicious activity. This includes disabling the process's ability to spawn other processes, overwrite memory, execute reconnaissance commands, or communicate over the network.
Functionality of Process Protection:
By restricting these high-risk actions, Process Protection reduces the chances of lateral movement, privilege escalation, or data exfiltration attempts within Active Directory.
This feature is critical in protecting AD environments from techniques commonly used in advanced persistent threats (APTs) and malware targeting AD infrastructure.
Comparison with Other Options:
Process Mitigation (Option A) generally refers to handling or reducing the effects of an attack but does not encompass all the control aspects of Process Protection.
Memory Analysis (Option C) and Threat Monitoring (Option D) involve observing and detecting threats rather than actively restricting process behavior.