Which of the following methods would be MOST appropriate to use?
A security analyst needs to develop a brief that will include the latest incidents and the attack phases of the incidents. The goal is to support threat intelligence and identify whether or not the incidents are linked.
Which of the following methods would be MOST appropriate to use?
A . An adversary capability model
B . The MITRE ATT&CK framework
C . The Cyber Kill Chain
D . The Diamond Model of Intrusion Analysis
Answer: B
Latest CS0-002 Dumps Valid Version with 220 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments