Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Broadcom Exam 250-580 Topic 2 Question 14 Discussion

Actual exam question for Broadcom's 250-580 exam
Question #: 14
Topic #: 2
[All 250-580 Questions]

An Incident Responder has determined that an endpoint is compromised by a malicious threat. What SEDR feature would be utilized first to contain the threat?

Show Suggested Answer Hide Answer
Suggested Answer: C

When an Incident Responder determines that an endpoint is compromised, the first action to contain the threat is to use the Isolation feature in Symantec Endpoint Detection and Response (SEDR). Isolation effectively disconnects the affected endpoint from the network, thereby preventing the malicious threat from communicating with other systems or spreading within the network environment. This feature enables the responder to contain the threat swiftly, allowing further investigation and remediation steps to be conducted without risk of lateral movement by the attacker.


Contribute your Thoughts:

File Deletion? What is this, the dark ages? Let's be more proactive with Isolation.
upvoted 0 times
...
Pamella
1 days ago
I see your point, Elli. Incident Manager can also help in managing and tracking the incident.
upvoted 0 times
...
Elli
2 days ago
But wouldn't using the Incident Manager be more effective in this situation?
upvoted 0 times
...
My
3 days ago
I agree with Pamella, isolating the endpoint can help contain the threat.
upvoted 0 times
...
Pamella
8 days ago
I think the first step would be to isolate the compromised endpoint.
upvoted 0 times
...
Annita
1 months ago
Incident Manager? Nah, that's for the big boss. We need something more hands-on, like Isolation.
upvoted 0 times
...
Idella
1 months ago
Hmm, I'd say Endpoint Activity Recorder. Sounds like the perfect tool to gather intel on the incident.
upvoted 0 times
Hana
11 days ago
I think Isolation would be the best option to contain the threat.
upvoted 0 times
...
...
Edna
2 months ago
Isolation is the way to go! Gotta contain that threat before it spreads like wildfire.
upvoted 0 times
Whitney
17 days ago
Once the endpoint is isolated, we can investigate further to determine the extent of the compromise.
upvoted 0 times
...
Bobbye
22 days ago
I agree, isolating the endpoint is crucial to prevent further damage.
upvoted 0 times
...
Marvel
1 months ago
Using the Isolation feature first is crucial in situations like this.
upvoted 0 times
...
Benton
1 months ago
I agree, isolating the endpoint can prevent the threat from spreading further.
upvoted 0 times
...
Paris
1 months ago
Isolation is definitely the best option to contain the threat.
upvoted 0 times
...
Brande
1 months ago
Isolation is definitely the best option to contain the threat.
upvoted 0 times
...
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77