A. Radius
B. LDAP
C. TACACS
D. SAML
A. It helps to make sure the hash is really a malware
B. It helps locate a file as threat hunting only allows hash search
C. It helps to find if some instances of the hash are actually associated with a different file
D. It helps to check the malware even if the malware variant uses a different file name
A. TestApplication exe is sophisticated malware
B. FCS classified the event as malicious
C. The user was able to launch TestApplication exe
D. The NGAV policy has blocked TestApplication exe