Multiple Choice
A customer has information about a malicious file that has NOT entered the network. The customer wants to know whether ATP is already aware of this threat without having to introduce a copy of the file to the infrastructure. Which approach allows the customer to meet this need?
A) Use the Cynic portal to check whether the MD5 hash triggers a detection from Cynic
B) Use the ATP console to check whether the SHA-256 hash triggers a detection from Cynic
C) Use the ATP console to check whether the MD5 hash triggers a detection from Cynic
D) Use the Cynic portal to check whether the SHA-256 hash triggers a detection from Cynic
Correct Answer:

Verified
Correct Answer:
Verified
Q106: An administrator is checking System Overview and
Q107: Where can an administrator locate the "Pen
Q108: Which agent policy contains settings to configure
Q109: You are planning a relayout for a
Q110: Which process is acceptable for validating domain
Q112: After installing Veritas Enterprise Administrator, you start
Q113: An Incident Responder needs to remediate a
Q114: Which two steps must an Incident Responder
Q115: Which installation package should an administrator use
Q116: Where can an administrator locate the "Pen