How does FortiEDR implement post-infection protection?
By preventing data exfiltration or encryption even after a breach occurs
By using methods used by traditional EDR
By insurance against ransomware
By real-time filtering to prevent malware from executing
NSE 5 Network Security Analyst |
TESTED 21 Nov 2024
Copyright © 2014-2024 CramTick. All Rights Reserved