Watch this video on YouTube
Which of the following techniques could enable an organization to identify and remediate a ransomware attack before it completes data encryption?