exam questions

Exam 350-701 All Questions

View all questions & answers for the 350-701 exam

Exam 350-701 topic 1 question 239 discussion

Actual exam question from Cisco's 350-701
Question #: 239
Topic #: 1
[All 350-701 Questions]

An engineer is configuring AMP for endpoints and wants to block certain files from executing.
Which outbreak control method is used to accomplish this task?

  • A. device flow correlation
  • B. simple detections
  • C. application blocking list
  • D. advanced custom detections
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
klu16
Highly Voted 2 years, 9 months ago
I thought it's B like some guys said, but it's C for sure... From AMP for Endpoints User Guide, chapter 2: Outbreak Control: An application blocking list is composed of files that you do not want to allow users to execute but do not want to quarantine. You may want to use this for files you are not sure are malware, unauthorized applications, or you may want to use this to stop applications with vulnerabilities from executing until a patch has been released. B also is incorrect, because it says "simple detections" but actually it's called simple custom detections (like in answer D, but it's another function which allows the customer to write his own antivirus definitions...). I am 100% sure it's an answer C here :)
upvoted 16 times
aaInman
2 years, 7 months ago
C = Correct as Klu16 pointed out. Also "B" does not block, it quarantines. This is from same doc klu mentioned regarding "B": A Simple Custom Detection list is similar to a blocked list. These are files that you want to detect and quarantine. Not only will an entry in a Simple Custom Detection list quarantine future files, but through Retrospective it will quarantine instances of the file on any endpoints in your organization that the service has already seen it on.
upvoted 4 times
...
...
Alizade
Most Recent 7 months, 3 weeks ago
Selected Answer: C
C. Application Blocking List
upvoted 2 times
...
Emlia1
1 year, 5 months ago
It's C
upvoted 2 times
...
denverfly
2 years, 3 months ago
C is good. Outbreak control: Achieve control over suspicious files or outbreaks and remediate an infection without waiting for a content update. Within the outbreak control feature: â—¦ Simple custom detections can quickly block a specific file across all or selected systems â—¦ Advanced custom signatures can block families of polymorphic malware â—¦ Application blocking lists can enforce application policies or contain a compromised application being used as a malware gateway and stop the reinfection cycle â—¦ Custom whitelists will help ensure that safe, custom, or mission-critical applications continue to run no matter what â—¦ Device flow correlation will stop malware call-back communications at the source, especially for remote endpoints outside the corporate network
upvoted 2 times
...
MoII
2 years, 6 months ago
Would go with C here.
upvoted 2 times
...
Steve122
2 years, 6 months ago
Would go with C Application Block Lists are only applicable to binaries. When the SHA-256 of a binary is added to the Application Block List, AMP will prevent that file from being executed.
upvoted 2 times
...
beeker98106
2 years, 6 months ago
C. it is
upvoted 3 times
...
ferari
2 years, 10 months ago
The correct answer is B. https://www.connection.com/~/media/pdfs/brands/c/cisco/cisco-security-amp-solution-overview.pdf?la=en
upvoted 2 times
...
itisfakemaillol
2 years, 11 months ago
For me the answer is B A Simple Custom Detection list is similar to a blocked list. These are files that you want to detect and quarantine. Not only will an entry in a Simple Custom Detection list quarantine future files, but through Retrospective it will quarantine instances of the file on any endpoints in your organization that the service has already seen it on.
upvoted 3 times
...
Luc_10
2 years, 11 months ago
I would answer D in this case, as custom detection blocks specific files, while application control is used to block application
upvoted 1 times
Seawanderer
2 years, 11 months ago
It’s tricky, as for example we don’t execute an excel file but we run instead excel program that opens the excel file itself.
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...