Discover new perspectives and gain insights with IDNLearn.com's diverse answers. Our experts provide timely, comprehensive responses to ensure you have the information you need.

Which analysis method relies on actions from previously known malicious files, and alerts when similar characteristics are detected, helping to identify a new variant of the malicious file or a zero-day threat?
A. Signature-based analysis
B. Heuristic-based analysis
C. Availability analysis
D. Trend anomaly analysis