A business was recently breached due to a user downloading a file from the internet. This file, once opened, ran a Trojan virus throughout the organization’s network. The business wants a better way to detect this type of activity. What should they replace their antivirus with, even though it costs more money?(1 point)

Responses

enforce a more strict email protection policy
enforce a more strict email protection policy

implement endpoint threat detection and response (ETDR)
implement endpoint threat detection and response (ETDR)

check that all firewalls are operational
check that all firewalls are operational

enable two-factor authentication (2FA)

implement endpoint threat detection and response (ETDR)