Congratulations! You have successfully completed the Network Security Overview.
You should now be able to:
- Explain how the Network Security’s MVX engine analyzes suspicious files and URLs.
- Describe how infection and callback rules are generated and shared with the FireEye user community via the FireEye Dynamic Threat Intelligence (DTI) Cloud to protect against future attacks.
- Differentiate between an integrated and distributed deployment.
- Explain the benefits of response workflow integration using the full suite of FireEye products.