Which configuration is needed to mitigate this threat?

Posted by: Pdfprep Category: 300-710 Tags: , ,

A network engineer is logged into the Cisco AMP for Endpoints console and sees a malicious verdict for an identified SHA-256 hash.

Which configuration is needed to mitigate this threat?
A . Add the hash to the simple custom deletion list.
B . Use regular expressions to block the malicious file.
C . Enable a personal firewall in the infected endpoint.
D . Add the hash from the infected endpoint to the network block list.

Answer: A

Leave a Reply

Your email address will not be published.