When configuring the sensor for endpoint protection, what is a common feature used to prevent unauthorized software execution?

When configuring the sensor for endpoint protection, what is a common feature used to prevent unauthorized software execution?
A . Whitelisting
B . Blacklisting
C . Intrusion detection
D . Behavioral analysis

Answer: A

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments