I remember a similar question where we had to choose between adding an IOC in Crowdstrike or Netskope. I feel like this one is leaning towards Crowdstrike too.
Ha! If the malware hash was added as an IOC in Netskope, that would be like trying to catch a fish with a net made of holes. Gotta go with B on this one.
Hmm, I'm not too sure about this one. Isolating the endpoint or quarantining the malware would also make sense. I'll have to think this through carefully.
Alisha
4 months agoShawna
5 months agoLynelle
5 months agoLilli
5 months agoEileen
5 months agoBeckie
5 months agoJohnathon
6 months agoDeonna
6 months agoVinnie
6 months agoIsabelle
6 months agoMarica
6 months agoHillary
6 months agoDevorah
6 months agoMerlyn
6 months agoAn
11 months agoLavera
10 months agoGerardo
10 months agoChan
10 months agoAnjelica
11 months agoNicholle
10 months agoHollis
10 months agoNoemi
10 months agoClement
10 months agoAnisha
10 months agoAntonio
11 months agoLeslee
12 months agoSalome
1 year agoNatalie
11 months agoMayra
11 months agoNatalie
1 year agoEdwin
1 year agoNatalie
1 year ago