An organization identified a threat in their environment and needs to limit the spread of the threat. How should the SEP Administrator block the threat using Application and Device Control?
A) Gather the MD5 hash of the file and create an Application Content Rule that blocks the file based on specific arguments
B) Gather the MD5 hash of the file and create an Application Content Rule that blocks the file based on the file fingerprint
C) Gather the MD5 hash of the file and create an Application Content Rule that uses regular expression matching
D) Gather the process name of the file and create an Application Content Rule that blocks the file based on the device id type
Correct Answer:
Verified
Q98: What Symantec Endpoint Protection component facilitates distributing
Q99: What two core technologies does Symantec Endpoint
Q100: An organization is troubleshooting a SONAR false
Q101: Where could a SEP Administrator specify a
Q102: An organization needs to add a collection
Q104: What is the difference between a Block
Q105: An organization would like to control the
Q106: How could an administrator decrease the timeout
Q107: What SEP feature is leveraged when configuring
Q108: What type of exceptions could an administrator
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents