Cisco 350-401 Question Answer
Which technique is used to protect end user devices and data from unknown file behavior?
crypto file ransomware protection using a file hash calculation
file retrospection using continuous scan and analyses
phishing file quarantine using an internal environment to store attached files
file sandboxing using a protected environment to analyze and simulate the behavior of unknown files
TESTED 15 Jul 2025
Copyright © 2014-2025 ACE4Sure. All Rights Reserved