A security operations center wants to implement a solution that can execute files to test for malicious activity. The solution should provide a report of the files' activity against known threats. Which of the following should the security operations center implement?
HiyaGeorgie
Highly Voted 2 years agoApplebeesWaiter1122
Highly Voted 2 years, 1 month agocyberPunk28
Most Recent 1 year, 6 months agoGamsje
1 year, 11 months agofouserd
2 years, 1 month agomouettespaghetti
2 years, 2 months ago