A network engineer is logged into the Cisco AMP for Endpoints console and sees a malicious verdict for an identified SHA-256 hash. Which configuration is needed to mitigate this threat?
A) Add the hash to the simple custom detection list
B) Use regular expressions to block the malicious file
C) Enable a personal firewall in the infected endpoint
D) Add the hash from the infected endpoint to the network block list
Correct Answer:
Verified
Q107: What are two application layer preprocessors? (Choose
Q108: What is a feature of Cisco AMP
Q109: A network administrator is concerned about the
Q110: Which two conditions are necessary for high
Q111: What is a result of enabling Cisco
Q113: In a Cisco AMP for Networks deployment,
Q114: With Cisco Firepower Threat Defense software, which
Q115: Which interface type allows packets to be
Q116: An engineer must build redundancy into the
Q117: What is a valid Cisco AMP file
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents