The primary goal of the threat-hunting team at a large company is to identify cyberthreats that the SOC has not detected. Which of the following types of data would the threat-hunting team primarily use to identify systems that are exploitable?
A vulnerability scan is a type of data that can identify systems that are exploitable by detecting known weaknesses and misconfigurations in the software and hardware. Packet capture, threat feed, and user behavior are types of data that can help identify malicious activities or indicators of compromise, but not necessarily the systems that are vulnerable to exploitation.
Margot
10 months agoAlberto
10 months agoCarlota
10 months agoNiesha
10 months agoVal
10 months agoCarlota
10 months agoJerry
11 months agoMarguerita
11 months agoWillis
12 months agoJerry
12 months agoAllene
1 years agoKenny
1 years agoMatthew
11 months agoBettina
11 months agoNichelle
12 months agoJanna
1 years agoVicky
1 years agoFrankie
1 years agoSon
1 years agoEmerson
12 months agoQueenie
12 months agoBrandon
12 months agoJessenia
12 months agoJoanne
12 months agoNieves
12 months agoMerilyn
1 years agoAugustine
1 years agoSerita
1 years agoPearline
1 years agoTrevor
1 years ago