Refer to the exhibit.
A workstation downloads a malicious docx file from the Internet and a copy is sent to FTDv. The FTDv sends the file hash to FMC and the tile event is recorded what would have occurred with stronger data visibility.
How can TOR impact data visibility inside an organization?
What ate two categories of DDoS attacks? (Choose two.)
What is the impact of encryption?