List of questions
Related questions
Question 590 - SY0-601 discussion
A security analyst has been reading about a newly discovered cyberattack from a known threat actor Which of the following would best support the analyst's review of the tactics, techniques, and protocols the throat actor was observed using in previous campaigns?
A.
Security research publications
B.
The MITRE ATT4CK framework
C.
The Diamond Model of Intrusion Analysis
D.
The Cyber Kill Cham
Your answer:
0 comments
Sorted by
Leave a comment first