List of questions
Related questions
Question 53 - CAS-004 discussion
A company's SOC has received threat intelligence about an active campaign utilizing a specific vulnerability. The company would like to determine whether it is vulnerable to this active campaign.
Which of the following should the company use to make this determination?
A.
Threat hunting
B.
A system penetration test
C.
Log analysis within the SIEM tool
D.
The Cyber Kill Chain
Your answer:
0 comments
Sorted by
Leave a comment first