exam questions

Exam 300-710 All Questions

View all questions & answers for the 300-710 exam

Exam 300-710 topic 1 question 136 discussion

Actual exam question from Cisco's 300-710
Question #: 136
Topic #: 1
[All 300-710 Questions]

A network engineer is logged into the Cisco AMP for Endpoints console and sees a malicious verdict for an identified SHA-256 hash. Which configuration is needed to mitigate this threat?

  • A. Add the hash to the simple custom detection list
  • B. Use regular expressions to block the malicious file
  • C. Enable a personal firewall in the infected endpoint
  • D. Add the hash from the infected endpoint to the network block list
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
greeklover84
7 months, 1 week ago
Selected Answer: A
https://www.cisco.com/c/en/us/support/docs/security/amp-endpoints/215176-configure-a-simple-custom-detection-list.html
upvoted 3 times
...
LangaMos
9 months, 1 week ago
Simple Custom Detection is a method for identifying and quarantining a specific file by its SHA-256 hash
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago