Q: 9
To minimize the cost and damage of ransomware attacks the cybersecurity team provided static
analysis of files in an environment and compare a ransomware sample hash to known data.
Which detection mechanism is used to detect data theft techniques to access valuable information
and hold ransom?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.