Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 300-710 Topic 3 Question 97 Discussion

Actual exam question for Cisco's 300-710 exam
Question #: 97
Topic #: 3
[All 300-710 Questions]

An organization created a custom application that is being flagged by Cisco Secure Endpoint. The application must be exempt from being flagged. What is the process to meet the requirement?

Show Suggested Answer Hide Answer
Suggested Answer: B

To exempt a custom application from being flagged by Cisco Secure Endpoint, the organization must precalculate the hash value of the custom application and add it to the allowed applications list. This process involves creating a hash of the executable file, which uniquely identifies it, and then configuring Cisco Secure Endpoint to recognize this hash as trusted.

Steps:

Calculate the hash value (e.g., SHA-256) of the custom application executable.

In the Cisco Secure Endpoint management console, navigate to the policy configuration.

Add the calculated hash value to the list of allowed applications or exclusions.

Save and deploy the updated policy.

By adding the hash value to the allowed applications, Cisco Secure Endpoint will recognize the custom application as trusted and will no longer flag it.


Contribute your Thoughts:

Theola
1 days ago
Haha, I bet the developer of this custom app is just hoping it doesn't get flagged at all. Maybe they should have named it 'Cisco Approved' instead of 'Custom Application'.
upvoted 0 times
...
Dorothy
4 days ago
Wait, what's DFC 1st? I've never heard of that before. Option D sounds a bit sketchy to me.
upvoted 0 times
...
Cordelia
12 days ago
Hmm, I'm not sure. But I like the idea of using the information-store paths in option C. It seems like a more proactive approach than just modifying the detection list.
upvoted 0 times
...
Elbert
13 days ago
I think the answer is B. Precomputing the hash value and adding it to the allowed applications sounds like the most straightforward way to exempt the custom application from being flagged.
upvoted 0 times
...
Cordell
13 days ago
I'm not sure, but I think option B) Precalculate the hash value of the custom application and add it to the allowed applications could also work.
upvoted 0 times
...
Tess
21 days ago
I agree with Avery. That seems like the most logical solution to meet the requirement.
upvoted 0 times
...
Avery
25 days ago
I think the answer is A) Modify the custom detection list to exclude the custom application.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77