ExamGecko
Question list
Search
Search

Question 292 - 350-701 discussion

Report
Export

A company discovered an attack propagating through their network via a file. A custom file policy was created in order to track this in the future and ensure no other endpoints execute the infected file. In addition, it was discovered during testing that the scans are not detecting the file as an indicator of compromise. What must be done in order to ensure that the created is functioning as it should?

A.

Create an IP block list for the website from which the file was downloaded

Answers
A.

Create an IP block list for the website from which the file was downloaded

B.

Block the application that the file was using to open

Answers
B.

Block the application that the file was using to open

C.

Upload the hash for the file into the policy

Answers
C.

Upload the hash for the file into the policy

D.

Send the file to Cisco Threat Grid for dynamic analysis

Answers
D.

Send the file to Cisco Threat Grid for dynamic analysis

Suggested answer: C
asked 10/10/2024
Sergey Aleksandrov
50 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first