Mark, a security analyst, was tasked with performing threat hunting to detect imminent threats in an organization's network. He generated a hypothesis based on the observations in the initial step and started the threat-hunting process using existing data collected from DNS and proxy logs.
Identify the type of threat-hunting method employed by Mark in the above scenario.
Cory
5 months agoWilletta
5 months agoHassie
5 months agoReyes
5 months agoLanie
6 months agoCassie
6 months agoBarbra
6 months agoDean
6 months agoBasilia
6 months agoHyman
6 months agoPaulene
6 months agoAudry
6 months agoGeorgeanna
6 months agoGiuseppe
6 months agoThurman
11 months agoSophia
10 months agoHoward
11 months agoUla
11 months agoJoni
12 months agoBlythe
10 months agoJennifer
10 months agoWillie
10 months agoDomonique
10 months agoMelinda
10 months agoAliza
11 months agoBok
11 months agoFloyd
11 months agoMeaghan
12 months agoEileen
1 year agoStevie
1 year agoAngelica
10 months agoIlene
11 months agoAleta
11 months agoAhmad
11 months agoMichael
1 year agoSantos
1 year agoHobert
1 year ago