Which threat hunting technique involves analyzing system logs for unusual or suspicious activity?
Which threat hunting technique involves analyzing system logs for unusual or suspicious activity?
A . Payload analysis
B . Behavioral analytics
C . Log analysis
D . Threat emulation
Answer: C
Latest 300-220 Dumps Valid Version with 130 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments