Multiple Choice
A network engineer is logged into the Cisco AMP for Endpoints console and sees a malicious verdict for an identified SHA-256 hash. Which configuration is needed to mitigate this threat?
A) Add the hash to the simple custom detection list
B) Use regular expressions to block the malicious file
C) Enable a personal firewall in the infected endpoint
D) Add the hash from the infected endpoint to the network block list
Correct Answer:

Verified
Correct Answer:
Verified
Q66: An administrator is working on a migration
Q67: Which two features of Cisco AMP for
Q68: What is a feature of Cisco AMP
Q69: How many report templates does the Cisco
Q70: A network engineer is receiving reports of
Q72: Which command is entered in the Cisco
Q73: <img src="https://d2lvgg3v3hfg70.cloudfront.net/C1178/.jpg" alt=" Refer to the
Q74: An engineer is implementing Cisco FTD in
Q75: An engineer configures an access control rule
Q76: An organization is setting up two new