Which approach allows the customer to meet this need?

A customer has information about a malicious file that has NOT entered the network. The customer wants to know whether ATP is already aware of this threat without having to introduce a copy of the file to the infrastructure.
Which approach allows the customer to meet this need?
A. Use the Cynic portal to check whether the MD5 hash triggers a detection from Cynic
B. Use the ATP console to check whether the SHA-256 hash triggers a detection from Cynic
C. Use the ATP console to check whether the MD5 hash triggers a detection from Cynic
D. Use the Cynic portal to check whether the SHA-256 hash triggers a detection from Cynic

Download Printable PDF. VALID exam to help you PASS.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.