A. Encrypted files
B. Spam emails
C. Known malware
D. Botnet connections
E. Malicious URLs
A. Antivirus scan
B. Cache check
C. VM scan
D. Static analysis
A. Antivirus inspection on downloaded files
B. IP reputation check on callback connections
C. URL rating on FQDN seen in DNS requests
D. URL rating on HTTP GET requests