Mark, a security analyst, was tasked with performing threat hunting to detect imminent threats in an organization's network. He generated a hypothesis based on the observations in the initial step and started the threat-hunting process using existing data collected from DNS and proxy logs.
Identify the type of threat-hunting method employed by Mark in the above scenario.
Cory
3 months agoWilletta
3 months agoHassie
4 months agoReyes
4 months agoLanie
4 months agoCassie
4 months agoBarbra
4 months agoDean
5 months agoBasilia
5 months agoHyman
5 months agoPaulene
5 months agoAudry
5 months agoGeorgeanna
5 months agoGiuseppe
5 months agoThurman
10 months agoSophia
8 months agoHoward
9 months agoUla
9 months agoJoni
10 months agoBlythe
8 months agoJennifer
8 months agoWillie
8 months agoDomonique
9 months agoMelinda
9 months agoAliza
9 months agoBok
10 months agoFloyd
10 months agoMeaghan
10 months agoEileen
11 months agoStevie
11 months agoAngelica
9 months agoIlene
9 months agoAleta
9 months agoAhmad
10 months agoMichael
11 months agoSantos
11 months agoHobert
11 months ago