Which statement demonstrates how Symantec EDR hunts and detects IoCs in the environment?
A.
Searching the EDR database and multiple data sources directly
B.
Viewing PowerShell processes
C.
Detecting Memory Exploits in conjunction with SEP
D.
Detonating suspicious files using cloud-based or on-premises sandboxing
The Answer Is:
A
This question includes an explanation.
Explanation:
Symantec Endpoint Detection and Response (EDR) hunts and detects Indicators of Compromise (IoCs) bysearching the EDR database and other data sources directly. This direct search approach allows EDR to identify malicious patterns or artifacts that may signal a compromise.
How EDR Hunts IoCs:
By querying the EDR database along with data from connected sources, administrators can identify signs of potential compromise across the environment. This includes endpoint logs, network traffic, and historical data within the EDR platform.
The platform enables security teams to look for specific IoCs, such as file hashes, IP addresses, or registry modifications associated with known threats.
Why Other Options Are Less Suitable:
Viewing PowerShell processes (Option B) or detecting memory exploits with SEP (Option C) are specific techniques but do not represent the comprehensive IoC-hunting approach.
Detonating suspicious files in sandboxes (Option D) is more of a behavioral analysis method rather than direct IoC hunting.
References: Direct database and data source searches are core to EDR’s hunting capabilities, as outlined in Symantec’s EDR operational guidelines.
250-580 PDF/Engine
Printable Format
Value of Money
100% Pass Assurance
Verified Answers
Researched by Industry Experts
Based on Real Exams Scenarios
100% Real Questions
Get 65% Discount on All Products,
Use Coupon: "ac4s65"