What is threat hunting?
A . Managing a vulnerability assessment report to mitigate potential threats.
B . Focusing on proactively detecting possible signs of intrusion and compromise.
C . Pursuing competitors and adversaries to infiltrate their system to acquire intelligence data.
D . Attempting to deliberately disrupt servers by altering their availability
Answer: A
Latest 200-201 Dumps Valid Version with 154 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund