Which action should you take when Cisco Threat Response notifies you that AMP has identified a file as malware?
What is the maximum SHA level of filtering that Threat Intelligence Director supports?
Which command should be used on the Cisco FTD CLI to capture all the packets that hit an interface?
When do you need the file-size command option during troubleshooting with packet capture?
Which two features of Cisco AMP for Endpoints allow for an uploaded file to be blocked? (Choose two.)