A cybersecurity analyst is dissecting an intrusion down to the specific techniques and wants to organize them in a logical manner.
Which of the following frameworks would BEST apply in this situation?
A . Pyramid of Pain
B . MITRE ATT&CK
C . Diamond Model of Intrusion Analysts
D . CVSS v3.0
Answer: B
Latest CS0-002 Dumps Valid Version with 220 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund