A Linux-based file encryption malware was recently discovered in the wild. Prior to running the malware on a preconfigured sandbox to analyze its behavior, a security professional executes the following command: umount -a -t cifs,nfs
Which of the following is the main reason for executing the above command?
A. To ensure the malware is memory bound.
B. To limit the malware’s reach to the local host.
C. To back up critical files across the network
D. To test if the malware affects remote systems