Which technique is used to protect end user devices and data from unknown file behavior?
crypto file ransomware protection using a file hash calculation
file retrospection using continuous scan and analyses
phishing file quarantine using an internal environment to store attached files
file sandboxing using a protected environment to analyze and simulate the behavior of unknown files
Submit