Q: 13
A security analyst detects an employee endpoint making connections to a malicious IP on the
internet and downloaded a file named Test0511127691C.pdf. The analyst discovers the machine is
infected by trojan malware. What must the analyst do to mitigate the threat using Cisco Secure
Endpoint?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.