In a Cisco AMP for Networks deployment, which disposition is returned if the cloud cannot be reached?
What is the maximum SHA level of filtering that Threat Intelligence Director supports?
Which two remediation options are available when Cisco FMC is integrated with Cisco ISE? (Choose two.)
Which action should you take when Cisco Threat Response notifies you that AMP has identified a file as malware?
Which two features of Cisco AMP for Endpoints allow for an uploaded file to be blocked? (Choose two.)