List of questions
Related questions
Question 15 - D-SF-A-24 discussion
To minimize the cost and damage of ransomware attacks the cybersecurity team provided static analysis of files in an environment and compare a ransomware sample hash to known data.
Which detection mechanism is used to detect data theft techniques to access valuable information and hold ransom?
A.
Signature based
B.
Behavior based
C.
Deception based
Your answer:
0 comments
Sorted by
Leave a comment first