【单选题】
A Use Cisco AMP deployment with the Malicious Activity Protection engineer enabled
B Use Cisco AMP deployment with the Exploit Prevention engine enabled
C Use Cisco Firepower and block traffic to TOR networks
D Use Cisco Firepower with Intrusion Policy and snort rules blocking SMB exploitation
查看更多