- by establishing an authentication parameter prior to any data exchange
- by addressing all stages of an attack lifecycle with a signature-less engine utilizing stateful attack analysis
- by keeping a detailed analysis of all viruses and malware
- by only accepting encrypted data packets that validate against their configured hash values
Explanation: FireEye uses a three-pronged approach combining security intelligence, security expertise, and technology. It addresses all stages of an attack lifecycle with a signature-less engine utilizing stateful attack analysis to detect zero-day threats.
More Questions: Modules 18 – 20: Network Defense Group Exam