In the context of SOC operations, mapping adversary behaviors to MITRE ATT&CK techniques primarily helps in:

In the context of SOC operations, mapping adversary behaviors to MITRE ATT&CK techniques primarily helps in:
A . Speeding up system recovery
B . Predicting future attacks
C . Understanding the attack lifecycle
D . Facilitating regulatory compliance

Answer: C

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments