When using the “File Search and Destroy” feature, which of the following search hash type is supported?
When using the “File Search and Destroy” feature, which of the following search hash type is supported?
A . SHA256 hash of the file
B . AES256 hash of the file
C . MD5 hash of the file
D . SHA1 hash of the file
Answer: A
Explanation:
The File Search and Destroy feature is a capability of Cortex XDR that allows you to search for and delete malicious or unwanted files across your endpoints. You can use this feature to quickly respond to incidents, remediate threats, and enforce compliance policies. To use the File Search and Destroy feature, you need to specify the file name and the file hash of the file you want to search for and delete. The file hash is a unique identifier of the file that is generated by a cryptographic hash function. The file hash ensures that you are targeting the exact file you want, and not a file with a similar name or a different version. The File Search and Destroy feature supports the SHA256 hash type, which is a secure hash algorithm that produces a 256-bit (32-byte) hash value. The SHA256 hash type is widely used for file integrity verification and digital signatures. The File Search and Destroy feature does not support other hash types, such as AES256, MD5, or SHA1, which are either encryption algorithms or less secure hash algorithms. Therefore, the correct answer is A, SHA256 hash of the file1234
Reference: File Search and Destroy
What is a File Hash?
SHA-2 – Wikipedia
When using the “File Search and Destroy” feature, which of the following search hash type is supported?
Latest PCDRA Dumps Valid Version with 60 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund