What is used to reduce attack surfaces?
Remediation
Segmentation
Device trust
Access
How do AMP's device trajectory capabilities help address customers' breach remediation issues?
It analyzes the data from suspicious files to provide a new level of threat intelligence.
It determines the scope and cause of an outbreak and tracks suspicious files
It tracks file behavior across the network to see which devices it enters and exits
It searches for potential threats based on identified activities and behaviors
Which two attack vectors are protected by MFA? (Choose Two)
Mobile
Endpoints
Data center
Web
Cloud
What are two tenants of establishing an SD-perimeter? (Choose Two)
Securing app access
Securing network access
Securing device access
Securing userdevice trust
Securing endpoints
Which attack vector is protected by Email Security?
Voicemail