The primary goal of the threat-hunting team at a large company is to identify cyberthreats that the SOC has not detected. Which of the following types of data would the threat-hunting team primarily use to identify systems that are exploitable?
A vulnerability scan is a type of data that can identify systems that are exploitable by detecting known weaknesses and misconfigurations in the software and hardware. Packet capture, threat feed, and user behavior are types of data that can help identify malicious activities or indicators of compromise, but not necessarily the systems that are vulnerable to exploitation.
Margot
12 months agoAlberto
12 months agoCarlota
12 months agoNiesha
12 months agoVal
12 months agoCarlota
12 months agoJerry
1 years agoMarguerita
1 years agoWillis
1 years agoJerry
1 years agoAllene
1 years agoKenny
1 years agoMatthew
1 years agoBettina
1 years agoNichelle
1 years agoJanna
1 years agoVicky
1 years agoFrankie
1 years agoSon
1 years agoEmerson
1 years agoQueenie
1 years agoBrandon
1 years agoJessenia
1 years agoJoanne
1 years agoNieves
1 years agoMerilyn
1 years agoAugustine
1 years agoSerita
1 years agoPearline
1 years agoTrevor
1 years ago