A customer has information about a malicious file that has NOT entered the network. The customer wants to know whether ATP is already aware of this threat without having to introduce a copy of the file to the infrastructure.
Which approach allows the customer to meet this need?
A. Use the Cynic portal to check whether the MD5 hash triggers a detection from Cynic
B. Use the ATP console to check whether the SHA-256 hash triggers a detection from Cynic
C. Use the ATP console to check whether the MD5 hash triggers a detection from Cynic
D. Use the Cynic portal to check whether the SHA-256 hash triggers a detection from Cynic