nerdexam
CiscoCisco

350-401 · Question #1133

350-401 Question #1133: Real Exam Question with Answer & Explanation

Sign in or unlock 350-401 to reveal the answer and full explanation for question #1133. The question stem and answer options stay visible for context.

Submitted by kavita_s· Mar 6, 2026Security

Question

Which technique is used to protect end user devices and data from unknown file behavior?

Options

  • Acrypto file ransomware protection using a file hash calculation
  • Bfile retrospection using continuous scan and analyses
  • Cfile sandboxing using a protected environment to analyze and simulate the behavior of unknown
  • Dphishing file quarantine using an internal environment to store attached files

Unlock 350-401 to see the answer

You've previewed enough free 350-401 questions. Unlock 350-401 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.

Topics

#File Sandboxing#Endpoint Security#Malware Analysis
Full 350-401 PracticeBrowse All 350-401 Questions