Big 11.11 Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Cisco Implementing and Operating Cisco Security Core Technologies (SCOR 350-701) 350-701 Question # 96 Topic 10 Discussion

Cisco Implementing and Operating Cisco Security Core Technologies (SCOR 350-701) 350-701 Question # 96 Topic 10 Discussion

350-701 Exam Topic 10 Question 96 Discussion:
Question #: 96
Topic #: 10

A company discovered an attack propagating through their network via a file. A custom file policy was created in order to track this in the future and ensure no other endpoints execute the infected file. In addition, it was discovered during testing that the scans are not detecting the file as an indicator of compromise. What must be done in order to ensure that the created is functioning as it should?


A.

Create an IP block list for the website from which the file was downloaded


B.

Block the application that the file was using to open


C.

Upload the hash for the file into the policy


D.

Send the file to Cisco Threat Grid for dynamic analysis


Get Premium 350-701 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.