The primary goal of the threat-hunting team at a large company is to identify cyberthreats that the SOC has not detected. Which of the following types of data would the threat-hunting team primarily use to identify systems that are exploitable?
A vulnerability scan is a type of data that can identify systems that are exploitable by detecting known weaknesses and misconfigurations in the software and hardware. Packet capture, threat feed, and user behavior are types of data that can help identify malicious activities or indicators of compromise, but not necessarily the systems that are vulnerable to exploitation.
Margot
7 months agoAlberto
7 months agoCarlota
7 months agoNiesha
7 months agoVal
7 months agoCarlota
7 months agoJerry
8 months agoMarguerita
8 months agoWillis
9 months agoJerry
9 months agoAllene
9 months agoKenny
9 months agoMatthew
8 months agoBettina
8 months agoNichelle
9 months agoJanna
10 months agoVicky
10 months agoFrankie
10 months agoSon
10 months agoEmerson
9 months agoQueenie
9 months agoBrandon
9 months agoJessenia
9 months agoJoanne
9 months agoNieves
9 months agoMerilyn
9 months agoAugustine
10 months agoSerita
10 months agoPearline
10 months agoTrevor
10 months ago