Before damage can occur to the network, Cisco Security Agent block malicious behavior through
___________
A.
Firewall
B.
Interception of operation system calls
C.
User query and response
D.
Third-party Anti-virus software
Before damage can occur to the network, Cisco Security Agent block malicious behavior through
___________
Before damage can occur to the network, Cisco Security Agent block malicious behavior through
___________
A.
Firewall
B.
Interception of operation system calls
C.
User query and response
D.
Third-party Anti-virus software