List of questions
Related questions
Question 292 - 350-701 discussion
A company discovered an attack propagating through their network via a file. A custom file policy was created in order to track this in the future and ensure no other endpoints execute the infected file. In addition, it was discovered during testing that the scans are not detecting the file as an indicator of compromise. What must be done in order to ensure that the created is functioning as it should?
A.
Create an IP block list for the website from which the file was downloaded
B.
Block the application that the file was using to open
C.
Upload the hash for the file into the policy
D.
Send the file to Cisco Threat Grid for dynamic analysis
Your answer:
0 comments
Sorted by
Leave a comment first