ExamGecko
Question list
Search
Search

Question 574 - 350-701 discussion

Report
Export

A company recently discovered an attack propagating throughout their Windows network via a file named abc428565580xyz exe The malicious file was uploaded to a Simple Custom Detection list in the AMP for Endpoints Portal and the currently applied policy for the Windows clients was updated to reference the detection list Verification testing scans on known infected systems shows that AMP for Endpoints is not detecting the presence of this file as an indicator of compromise What must be performed to ensure detection of the malicious file?

A.

Upload the malicious file to the Blocked Application Control List

Answers
A.

Upload the malicious file to the Blocked Application Control List

B.

Use an Advanced Custom Detection List instead of a Simple Custom Detection List

Answers
B.

Use an Advanced Custom Detection List instead of a Simple Custom Detection List

C.

Check the box in the policy configuration to send the file to Cisco Threat Grid for dynamic analysis

Answers
C.

Check the box in the policy configuration to send the file to Cisco Threat Grid for dynamic analysis

D.

Upload the SHA-256 hash for the file to the Simple Custom Detection List

Answers
D.

Upload the SHA-256 hash for the file to the Simple Custom Detection List

Suggested answer: D
asked 10/10/2024
Jonathan Dowds
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first