A. Files from removable storage
B. Command and control traffic
C. URLs from web requests
D. Downloads from emails
A. The file was extracted using sniffer-mode inspection.
B. The file contained malicious JavaScipt.
C. The file was sandboxed in two-guest VMs.
D. The file contained a malicious macro.
A. File security
B. Attack signature
C. Credential stuffing defense
D. IP reputation