Posted by: Pdfprep
Post Date: December 6, 2020
How does AMP’s device trajectory capabilities help address customer s issues?
A . It determines the scope and cause of an outbreak and tracks suspicious files
B . It searches for potential threats based on identified activities and behaviors
C . It isolates suspicious files and runs them in a sandbox environment to determine their authenticity
D . It analyses the data from suspicious files to provide a new level of threat intelligence
Answer: C