Which step in the threat hunting process involves examining network traffic patterns to identify anomalies?
Which step in the threat hunting process involves examining network traffic patterns to identify anomalies?
A . Data Collection
B . Log Analysis
C . Network Traffic Analysis
D . Threat Correlation
Answer: C
Latest 300-220 Dumps Valid Version with 130 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments