Site icon Exam4Training

Which step in the threat hunting process involves examining network traffic patterns to identify anomalies?

Which step in the threat hunting process involves examining network traffic patterns to identify anomalies?
A . Data Collection
B . Log Analysis
C . Network Traffic Analysis
D . Threat Correlation

Answer: C

Latest 300-220 Dumps Valid Version with 130 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Exit mobile version