How do AMP’s device trajectory capabilities help address customers’ breach remediation issues?
A . It analyzes the data from suspicious files to provide a new level of threat intelligence.
B . It determines the scope and cause of an outbreak and tracks suspicious files
C . It tracks file behavior across the network to see which devices it enters and exits
D . It searches for potential threats based on identified activities and behaviors
Answer: B