A business was recently breached due to a user downloading a file from the internet. This file, once opened, ran a Trojan virus throughout the organization’s network. The business wants a better way to detect this type of activity. What should they replace their antivirus with, even though it costs more money?(1 point)
Responses
implement endpoint threat detection and response (ETDR)
implement endpoint threat detection and response (ETDR)
enforce a more strict email protection policy
enforce a more strict email protection policy
enable two-factor authentication (2FA)
enable two-factor authentication (2FA)
check that all firewalls are operational
1 answer
implement endpoint threat detection and response (ETDR)