Multiple Choice
Which method is used by AMP against zero-day and targeted file-based attacks?
A) analyzing behavior of all files that are not yet known to the reputation service
B) periodically evaluating emerging threats as new information becomes available
C) implementing security group tags
D) obtaining the reputation of known files
Correct Answer:

Verified
Correct Answer:
Verified
Q23: What is a valid predefined time range
Q24: A user browses to a company website
Q25: What is needed to enable an HTTPS
Q26: Which certificate format does a Cisco WSA
Q27: What is the default action when a
Q29: An administrator wants to restrict file uploads
Q30: Which statement about configuring an identification profile
Q31: How does the Cisco WSA choose which
Q32: What is the purpose of using AMP
Q33: By default, which two pieces of information