List of questions
Related questions
Question 227 - 200-201 discussion
What is threat hunting?
A.
Managing a vulnerability assessment report to mitigate potential threats.
B.
Focusing on proactively detecting possible signs of intrusion and compromise.
C.
Pursuing competitors and adversaries to infiltrate their system to acquire intelligence data.
D.
Attempting to deliberately disrupt servers by altering their availability
Your answer:
0 comments
Sorted by
Leave a comment first