How does the Device Trajectory feature work?

How does the Device Trajectory feature work?
A. It searches for potential threats based on identified activities.
B. It tracks file behavior across the network to see which devices it enters and exits.
C. It analyzes the data from file and process retrospection to provide a new level of threat intelligence.
D. It isolates suspicious files and runs tests to determine their authenticity.
E. It tracks file behavior on a device to pinpoint the root cause of a compromise.

cisco-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.