Which step in the threat hunting process involves examining network traffic patterns to identify anomalies?

Which step in the threat hunting process involves examining network traffic patterns to identify anomalies?
A . Data Collection
B . Log Analysis
C . Network Traffic Analysis
D . Threat Correlation

Answer: C

Latest 300-220 Dumps Valid Version with 130 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments