Which two functionalities doe s the Threat Grid for the Cisco Meraki MX use of Sandbox technology allow?
A. Deploy decoys for the malware to target
B. Know what changes the malware is making
C. Locate where the malware originated form
D. To encrypt packet without an agent
E. To decrypt packet without an agent
F. Understanding of which processes the malware is affecting
BF – D does not make sense.
https://documentation.meraki.com/MX/Content_Filtering_and_Threat_Protection/Threat_Grid_Integration
Deeper insights into what malware is doing or attempting to do, how substantial a threat it poses to your organization and how to defend against it
Once the analysis is completed, a detailed report containing the threat score and behavioral indicators that matched the behaviors observed during analysis will be available in the Meraki Security Center.