Based on my understanding, the key things to focus on are the types of files (executable vs. application data) and where the hashes are being sent or cached. I think I've got a good handle on this now.
This question seems straightforward, but I want to make sure I understand the key differences between the file hash-related statements before selecting my answers.
I'm pretty sure C and D are the right answers. ESM servers sending hashes of applications and executables to WildFire allows for comprehensive malware analysis and detection.
A and B seem to be the correct options. The Traps agent caching hashes of executable files makes sense, and WildFire populating ESM's cache with known malicious hashes is a great way to leverage crowd-sourced intelligence.
Wynell
3 months agoVashti
3 months agoMing
3 months agoKiley
4 months agoGiuseppe
4 months agoWillodean
4 months agoCorrie
4 months agoVal
4 months agoTalia
5 months agoElly
5 months agoYong
5 months agoUna
5 months agoOretha
5 months agoMyong
10 months agoTonja
9 months agoMohammad
9 months agoPaul
10 months agoEdelmira
10 months agoFletcher
10 months agoLavonne
11 months agoFredric
11 months agoTeri
9 months agoRochell
10 months agoTony
10 months agoEden
10 months agoCasandra
11 months ago