nerdexam
CiscoCisco

350-701 · Question #303

350-701 Question #303: Real Exam Question with Answer & Explanation

Sign in or unlock 350-701 to reveal the answer and full explanation for question #303. The question stem and answer options stay visible for context.

Submitted by wei.xz· Mar 30, 2026Endpoint Security and Secure Network Access

Question

A company discovered an attack propagating through their network via a file. A custom file policy was created in order to track this in the future and ensure no other endpoints execute the infected file. In addition, it was discovered during testing that the scans are not detecting the file as an indicator of compromise. What must be done in order to ensure that the created is functioning as it should?

Options

  • ACreate an IP block list for the website from which the file was downloaded
  • BBlock the application that the file was using to open
  • CUpload the hash for the file into the policy
  • DSend the file to Cisco Threat Grid for dynamic analysis

Unlock 350-701 to see the answer

You've previewed enough free 350-701 questions. Unlock 350-701 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.

Topics

#File hash detection#Security file policies#Malware prevention
Full 350-701 PracticeBrowse All 350-701 Questions