exam questions

Exam 350-701 All Questions

View all questions & answers for the 350-701 exam

Exam 350-701 topic 1 question 57 discussion

Actual exam question from Cisco's 350-701
Question #: 57
Topic #: 1
[All 350-701 Questions]

A company discovered an attack propagating through their network via a file. A custom file detection policy was created in order to track this in the future and ensure no other endpoints execute to infected file. In addition, it was discovered during testing that the scans are not detecting the file as an indicator of compromise. What must be done in order to ensure that the policy created is functioning as it should?

  • A. Create an IP block list for the website from which the file was downloaded.
  • B. Block the application that the file was using to open.
  • C. Upload the hash for the file into the policy.
  • D. Send the file to Cisco Threat Grid for dynamic analysis.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
zeroC00L
Highly Voted 3 years, 3 months ago
i would go with C here because it looks like they are refering to the "custom detection list" from FMC(Firepower) which is part of the File Policy. With this you can do the following: Override File Disposition Using Custom Lists If a file has a disposition in the AMP cloud that you know to be incorrect, you can add the file’s SHA-256 value to a file list that overrides the disposition from the cloud: To treat a file as if the AMP cloud assigned a clean disposition, add the file to the clean list. To treat a file as if the AMP cloud assigned a malware disposition, add the file to the custom detection list. On subsequent detection, the device either allows or blocks the file without reevaluating the file's disposition. You can use the clean list or custom detection list per file policy. https://www.cisco.com/c/en/us/td/docs/security/firepower/623/configuration/guide/fpmc-config-guide-v623/file_policies_and_advanced_malware_protection.html
upvoted 7 times
...
sull3y
Highly Voted 1 year, 10 months ago
C. Upload the hash for the file into the policy. When a custom file detection policy is created in order to track a specific file, it is necessary to ensure that the file is being properly detected by the security scans. One way to do this is by uploading the hash of the file into the policy. The hash, also known as a digital fingerprint, is a unique identification code that is specific to a file. By including the hash of the infected file in the policy, the scans will be able to detect the file based on its unique characteristics, even if the file has been modified or renamed. This ensures that the policy is functioning as it should and that the infected file will be detected in the future. Although options like blocking the application that the file was using to open, sending the file to Cisco Threat Grid for dynamic analysis or creating an IP block list for the website from which the file was downloaded are good options to prevent the attack but they are not related to the custom file detection policy functionality.
upvoted 5 times
...
Marshpillowz
Most Recent 8 months, 2 weeks ago
Selected Answer: C
C is correct
upvoted 1 times
...
Naderelmansi
1 year, 8 months ago
Selected Answer: C
The correct answer is C. Upload the hash for the file into the policy. Option A is not an appropriate response to ensure the policy is functioning, as it involves blocking an IP address rather than detecting the file. Option B is also not an appropriate response, as blocking the application used to open the file may not prevent the file from being downloaded or executed on the endpoint. Option D is a good practice for threat analysis, but it does not address the issue of the custom file detection policy not detecting the file as an indicator of compromise. Uploading the hash of the file into the policy is a more direct approach to ensuring the policy is functioning as it should.
upvoted 2 times
...
Emlia1
2 years ago
It should be D
upvoted 1 times
...
sis_net_sec
2 years, 2 months ago
The correct answer is D
upvoted 2 times
...
otzu1
2 years, 7 months ago
C, configuring the policy doesn't imply it was configured correctly, add the file hash using sha 256/ OCG: Simple custom detection allows you to add file signatures, while the advanced custom detections are more like traditional antivirus signatures. Creating a simple custom detection is similar to adding new entries to a blacklist. You define one or more files that you are trying to quarantine by building a list of SHA-256 hashes. If you already have the SHA-256 hash of a file, you can paste that hash directly into the UI, or you can upload files directly and allow the cloud to create the SHA-256 hash for you. To create a simple custom detection, navigate to Outbreak Control > Custom Detections > Simple and the list of all existing simple custom detections appears, as shown in Figure 11-3. To add a new one, you must type it in the Name box and click Save, as shown in Figure 11-3.
upvoted 2 times
...
Wang87
2 years, 10 months ago
Selected Answer: C
Answer is C because question is regarding making custom policy work. By adding hash of file the policy will start working as it should. What must be done in order to ensure that the policy created is functioning as it should?
upvoted 4 times
dr4gn00t
2 years, 10 months ago
Exactly. I was first going with D, but after rereading the question C is best answer. You need to add hash for the custom policy to work. By uploading file to ThreatGrid, it would be detected dynamically but it wouldn't fix the custom detectetion policy, and this is what is been asked.
upvoted 1 times
...
...
Cock
2 years, 11 months ago
Selected Answer: C
I prefer C
upvoted 4 times
...
Jetnor
3 years ago
I would vote for D Because these products are designed to work in automatic way so we have to send file to 'threat grid' , and threat grid will automatically update the hash value to AMP database where our device gets updates about threats.
upvoted 1 times
...
zheka
3 years ago
For both AMP for endpoints and AMP under Firepower there's no way upload the hash for the file into the policy. This gives us an option of D - dynamic analysis with threat grid
upvoted 1 times
flejd
2 years, 11 months ago
You are wrong. Within Objects Tab you can find FILE LIST and in there a CUSTOM DETECTION LIST in which you can add/calculate a SH256 checksum.
upvoted 2 times
flejd
2 years, 11 months ago
but in the question they mention that the custom detection list is already prepared so its not C
upvoted 1 times
GatPat
1 year, 11 months ago
But then it also says - "What must be done in order to ensure that the policy created is functioning as it should?" So it would be C to make the policy work
upvoted 2 times
...
...
...
...
NullNull88
3 years ago
Definitely no to A and B. Also not D because we are not sending every single file to threat-grid for analysis as this is not necessary. See documentation on Custom Detection Lists. Answer is C
upvoted 2 times
...
brownb
3 years ago
Im thinking D. If the file is still considered unknown then the hash failed to get a positive ID through AMP so it needs dynamic analysis by sending it to threat grid for sandboxing.
upvoted 1 times
...
eazy99
3 years, 3 months ago
I believe the answer is C, they already created a custom file, and the scans can’t discover it, so they need to upload the hash for the scans to detect it because the scans needs some help to identify the malicious file, and nothing better than the hash in this scenario.
upvoted 4 times
...
ic0deem
3 years, 3 months ago
I vote for D, since this is Cisco exam and traditional IoCs are not seemed effective
upvoted 1 times
...
Sarbi
3 years, 3 months ago
I think it is A
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...