Cisco Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) 350-401 Question # 47 Topic 5 Discussion

Cisco Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) 350-401 Question # 47 Topic 5 Discussion

350-401 Exam Topic 5 Question 47 Discussion:
Question #: 47
Topic #: 5

Which technique is used to protect end user devices and data from unknown file behavior?


A.

crypto file ransomware protection using a file hash calculation


B.

file retrospection using continuous scan and analyses


C.

phishing file quarantine using an internal environment to store attached files


D.

file sandboxing using a protected environment to analyze and simulate the behavior of unknown files


Get Premium 350-401 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.