Angela wants to use her network security device to detect potential beaconing behavior. Which of the following options is best suited to detecting beaconing using her network security device?
Antivirus definitions
File reputation
IP reputation
Static file analysis