Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 350-701 Topic 1 Question 101 Discussion

Actual exam question for Cisco's 350-701 exam
Question #: 101
Topic #: 1
[All 350-701 Questions]

What must be configured on Cisco Secure Endpoint to create a custom detection tile list to detect and quarantine future files?

Show Suggested Answer Hide Answer
Suggested Answer: C

In Cisco Secure Endpoint, to create a custom detection file list for detecting and quarantining future files, an advanced custom detection should be created, and the hash of each file to be detected and quarantined should be uploaded. This allows the system to uniquely identify and take action on files based on their hash values, providing a precise method for targeting specific malicious or unwanted files.


Contribute your Thoughts:

Valentin
1 months ago
Option A might work, but it sounds like a lot of manual work. I'd prefer a more automated solution like Option C.
upvoted 0 times
...
Shawna
1 months ago
Haha, Option D is like trying to catch a fish with a net full of holes! Application control won't do much to stop those pesky files.
upvoted 0 times
Latonia
10 days ago
User 3: Yeah, Option D does seem like it wouldn't be very effective in this situation. Option C is definitely the way to go.
upvoted 0 times
...
Linn
11 days ago
User 2: I agree, Option C seems like the most thorough method to detect and quarantine future files.
upvoted 0 times
...
Adrianna
14 days ago
User 1: Option C sounds like the best way to go. Uploading the hash of each file for detection seems pretty effective.
upvoted 0 times
...
...
Ligia
1 months ago
I agree with Sylvie, option C makes the most sense for creating a custom detection tile list.
upvoted 0 times
...
Callie
1 months ago
I'm not sure about Option B. Blocking network IPs doesn't seem like the right way to handle this type of security issue.
upvoted 0 times
Eliseo
12 days ago
User 4: I think Option A could work too. Adding each detection to the list using the simple custom detection feature.
upvoted 0 times
...
Larae
15 days ago
User 3: I'm not sure about Option B either. Blocking network IPs doesn't seem like the right approach for this.
upvoted 0 times
...
Corrina
16 days ago
User 2: I agree with you, Corrina. Option C seems like the most secure way to handle this.
upvoted 0 times
...
Devora
18 days ago
User 1: I think Option C is the best choice. Uploading the hash of each file for detection sounds effective.
upvoted 0 times
...
...
Sylvie
2 months ago
I think the answer is C) Create an advanced custom detection and upload the hash of each file.
upvoted 0 times
...
Gabriele
2 months ago
Option C seems the most comprehensive approach to detecting and quarantining future files. Uploading the hash of each file is a great way to create a custom detection tile list.
upvoted 0 times
Carrol
14 days ago
Creating an advanced custom detection with uploaded file hashes definitely sounds like the way to go.
upvoted 0 times
...
Alyssa
23 days ago
Using the simple custom detection feature and adding each detection to the list could be time-consuming.
upvoted 0 times
...
Tyra
1 months ago
I agree, it seems like the most comprehensive approach to detecting and quarantining future files.
upvoted 0 times
...
Chan
1 months ago
I think option C is the best choice. Uploading the hash of each file for custom detection is a smart move.
upvoted 0 times
...
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77