Which method is used by AMP against zero-day and targeted file-based attacks?

Which method is used by AMP against zero-day and targeted file-based attacks?
A. analyzing behavior of all files that are not yet known to the reputation service
B. periodically evaluating emerging threats as new information becomes available
C. implementing security group tags
D. obtaining the reputation of known files

cisco-exams

0 thoughts on “Which method is used by AMP against zero-day and targeted file-based attacks?

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.