A company discovered an attack propagating through their network via a file. A custom file policy was created in order to track this in the future and ensure no other endpoints execute the infected file. In addition, it was discovered during testing that the scans are not detecting the file as an indicator of compromise.
What must be done in order to ensure that the created is functioning as it should?
A . Create an IP block list for the website from which the file was downloaded.
B . Block the application that the file was using to open.
C . Upload the hash for the file into the policy.
D . Send the file to Cisco Threat Grid for dynamic analysis.
Answer: D
Latest 350-701 Dumps Valid Version with 327 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund