How should the SEP Administrator block the threat using Application and Device Control?

An organization identified a threat in their environment and needs to limit the spread of the threat.
How should the SEP Administrator block the threat using Application and Device Control?
A. Gather the MD5 hash of the file and create an Application Content Rule that blocks the file based on specific arguments
B. Gather the MD5 hash of the file and create an Application Content Rule that blocks the file based on the file fingerprint
C. Gather the MD5 hash of the file and create an Application Content Rule that uses regular expression matching
D. Gather the process name of the file and create an Application Content Rule that blocks the file based on the device id type

Download Printable PDF. VALID exam to help you PASS.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.