Valid 350-701 Dumps shared by ExamDiscuss.com for Helping Passing 350-701 Exam! ExamDiscuss.com now offer the newest 350-701 exam dumps, the ExamDiscuss.com 350-701 exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com 350-701 dumps with Test Engine here:
A company recently discovered an attack propagating throughout their Windows network via a file named abc428565580xyz exe The malicious file was uploaded to a Simple Custom Detection list in the AMP for Endpoints Portal and the currently applied policy for the Windows clients was updated to reference the detection list Verification testing scans on known infected systems shows that AMP for Endpoints is not detecting the presence of this file as an indicator of compromise What must be performed to ensure detection of the malicious file?
Correct Answer: D
A Simple Custom Detection List is a feature of Cisco AMP for Endpoints that allows administrators to create a list of SHA-256 hashes of files that they want to detect, block, and quarantine on their endpoints. The list can be applied to a policy and the connectors will synchronize with the latest changes. However, the list only works with the exact SHA-256 hashes that are provided, and it does not detect any variations or modifications of the files. Therefore, if the malicious file abc428565580xyz.exe has been altered in any way, such as by changing its name, size, or content, the Simple Custom Detection List will not be able to recognize it as a threat. To ensure detection of the malicious file, the administrator must upload the SHA-256 hash of the current version of the file to the Simple Custom Detection List, or use another method that can detect file variations, such as an Advanced Custom Detection List or Cisco Threat Grid. References := Some possible references are: * Configure a Simple Custom Detection List on the AMP for Endpoints Portal * Create an Advanced Custom Detection List in Cisco Secure Endpoint * [Cisco AMP for Endpoints User Guide] https://www.cisco.com/c/en/us/td/docs/security/firepower/amp/6-3/user-guide/amp-user-guide.pdf