Which step in the threat hunting process involves creating and executing queries to search for indicators of compromise?
A . Data Collection
B . Data Analysis
C . Data Processing
D . Data Enrichment
Answer: B
Latest 300-220 Dumps Valid Version with 130 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund