Which threat hunting technique involves analyzing system logs for unusual or suspicious activity?

Which threat hunting technique involves analyzing system logs for unusual or suspicious activity?
A . Payload analysis
B . Behavioral analytics
C . Log analysis
D . Threat emulation

Answer: C

Latest 300-220 Dumps Valid Version with 130 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments