What are the two most prominent characteristics of the malware type rootkit? (Choose two.)
When signature-based antivirus software detects malware, what three things does it do to provide protection? (Choose three.)
What protocol requires all routers in the same domain to maintain a map of the network?
What does SOAR technology use to automate and coordinate workflows?