A network engineer is logged into the Cisco AMP for Endpoints console and sees a malicious verdict for an identified SHA-256 hash. Which configuration is needed to mitigate this threat?
A.
Add the hash to the simple custom detection list
B.
Use regular expressions to block the malicious file
C.
Enable a personal firewall in the infected endpoint
D.
Add the hash from the infected endpoint to the network block list
Simple Custom Detection is a method for identifying and quarantining a specific file by its SHA-256 hash
upvoted 3 times
...
This section is not available anymore. Please use the main Exam Page.300-710 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
greeklover84
7 months, 1 week agoLangaMos
9 months, 1 week ago