Notifications
Clear all
Topic starter
16/07/2022 8:11 pm
Refer to the exhibit.
What will happen when this Python script is run?
- A . The compromised computers and malware trajectories will be received from Cisco AMP
- B . The list of computers and their current vulnerabilities will be received from Cisco AMP
- C . The compromised computers and what compromised them will be received from Cisco AMP
- D . The list of computers, policies, and connector statuses will be received from Cisco AMP
Suggested Answer: D
Explanation:
Reference: https://api-docs.amp.cisco.com/api_actions/details?api_action=GET+%2Fv1%2Fcomputers&api_host=api.apjc.amp.cisco.com&api_resource=Computer&api_version=v1
Explanation:
Reference: https://api-docs.amp.cisco.com/api_actions/details?api_action=GET+%2Fv1%2Fcomputers&api_host=api.apjc.amp.cisco.com&api_resource=Computer&api_version=v1