How does CSA protect endpoints?
A.
uses signatures to detect and stop attacks
B.
uses deep-packet application inspections to control application misuse and abuse
C.
uses file system, network, registry, and execution space interceptors to stop malicious activity
D.
works in conjunction with antivirus software to lock down the OS
E.
works at the application layer to provide buffer overflow protection