A customer has information about a malicious file that has NOT entered the network. The customer wants to know whether ATP is already aware of this threat without having to introduce a copy of the file to the infrastructure. Which approach allows the customer to meet this need?
A) Use the Cynic portal to check whether the MD5 hash triggers a detection from Cynic
B) Use the ATP console to check whether the SHA-256 hash triggers a detection from Cynic
C) Use the ATP console to check whether the MD5 hash triggers a detection from Cynic
D) Use the Cynic portal to check whether the SHA-256 hash triggers a detection from Cynic
Correct Answer:
Verified
Q131: An ATP Administrator set up ATP: Network
Q132: Which type of assessment is unavailable within
Q133: Which threat is an example of an
Q134: What is the standard Time to Live
Q135: An Incident Responder documented the scope of
Q137: Why should an administrator configure Symantec Validation
Q138: An ATP administrator is setting up correlation
Q139: A network control point discovered a botnet
Q140: Which best practice does Symantec recommend with
Q141: What is a SMTP server that is
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents