How does FortiEDR implement post-infection protection?
By preventing data exfiltration or encryption even after a breach occurs
By using methods used by traditional EDR
By insurance against ransomware
By real-time filtering to prevent malware from executing
NSE 5 Network Security Analyst |
TESTED 22 Feb 2025
Copyright © 2014-2025 CramTick. All Rights Reserved