Which of AMP’s File capabilities deals with the problem of files passing through perimeter defenses that are later discovered to be a threat?
How does AMP’s device trajectory capabilities help address customer ’s issues?
Which AMP feature is provided by fuzzy fingerprinting?
Which are two main features of Intrusion Prevention? (Choose two.)