List of questions
Related questions
Question 206 - 300-710 discussion
An engineer is troubleshooting a file that is being blocked by a Cisco FTD device on the network.
The user is reporting that the file is not malicious.
Which action does the engineer take to identify the file and validate whether or not it is malicious?
A.
identify the file in the intrusion events and submit it to Threat Grid for analysis.
B.
Use FMC file analysis to look for the file and select Analyze to determine its disposition.
C.
Use the context explorer to find the file and download it to the local machine for investigation.
D.
Right click the connection event and send the file to AMP for Endpoints to see if the hash is malicious.
Your answer:
0 comments
Sorted by
Leave a comment first