Posted by: Pdfprep
Post Date: October 8, 2021
A network engineer is logged into the Cisco AMP for Endpoints console and sees a malicious verdict for an identified SHA-256 hash.
Which configuration is needed to mitigate this threat?
A . Add the hash to the simple custom deletion list.
B . Use regular expressions to block the malicious file.
C . Enable a personal firewall in the infected endpoint.
D . Add the hash from the infected endpoint to the network block list.
Answer: A
Leave a Reply