A. Files from removable storage
B. Command and control traffic
C. URLs from web requests
D. Downloads from emails
A. Replace suspicious files with a replacement message.
B. Detect network attacks.
C. Detect malicious URLs.
D. Move clean files to a separate network share.
A. test-network
B. traceroute
C. ping
D. tcpdump