A business was recently breached due to a user downloading a file from the internet. This file, once opened, ran a Trojan virus throughout the organization’s network. The business wants a better way to detect this type of activity. What should they replace their antivirus with, even though it costs more money?(1 point)

Responses

implement endpoint threat detection and response (ETDR)
implement endpoint threat detection and response (ETDR)

enforce a more strict email protection policy
enforce a more strict email protection policy

enable two-factor authentication (2FA)
enable two-factor authentication (2FA)

check that all firewalls are operational

implement endpoint threat detection and response (ETDR)