List of questions
Related questions
Question 33 - 212-82 discussion
Mark, a security analyst, was tasked with performing threat hunting to detect imminent threats in an organization's network. He generated a hypothesis based on the observations in the initial step and started the threat-hunting process using existing data collected from DNS and proxy logs.
Identify the type of threat-hunting method employed by Mark in the above scenario.
A.
Entity-driven hunting
B.
TTP-driven hunting
C.
Data-driven hunting
D.
Hybrid hunting
Your answer:
0 comments
Sorted by
Leave a comment first