Site icon Exam4Training

When configuring the sensor for endpoint protection, what is a common feature used to prevent unauthorized software execution?

When configuring the sensor for endpoint protection, what is a common feature used to prevent unauthorized software execution?
A . Whitelisting
B . Blacklisting
C . Intrusion detection
D . Behavioral analysis

Answer: A

Exit mobile version