Mark, a security analyst, was tasked with performing threat hunting to detect imminent threats in an organization's network. He generated a hypothesis based on the observations in the initial step and started the threat-hunting process using existing data collected from DNS and proxy logs.
Identify the type of threat-hunting method employed by Mark in the above scenario.
Thurman
3 months agoSophia
1 months agoHoward
2 months agoUla
2 months agoJoni
3 months agoBlythe
26 days agoJennifer
27 days agoWillie
28 days agoDomonique
2 months agoMelinda
2 months agoAliza
2 months agoBok
2 months agoFloyd
2 months agoMeaghan
3 months agoEileen
3 months agoStevie
3 months agoAngelica
2 months agoIlene
2 months agoAleta
2 months agoAhmad
3 months agoMichael
3 months agoSantos
3 months agoHobert
4 months ago