Cortex XSOAR has extracted a malicious Internet Protocol (IP) address involved in command-and-control (C2) traffic.
What is the best method to block this IP from communicating with endpoints without requiring a configuration change on the firewall?
A
Have XSOAR automatically add the IP address to a threat intelligence management (TIM) malicious IP list to elevate priority of future alerts.
B
Have XSOAR automatically add the IP address to a deny rule in the firewall.
C
Have XSOAR automatically add the IP address to an external dynamic list (EDL) used by the firewall.
D
Have XSOAR automatically create a NetOps ticket requesting a configuration change to the firewall to block the IP.
Show Answer