The primary goal of the threat-hunting team at a large company is to identify cyberthreats that the SOC has not detected. Which of the following types of data would the threat-hunting team primarily use to identify systems that are exploitable?
A vulnerability scan is a type of data that can identify systems that are exploitable by detecting known weaknesses and misconfigurations in the software and hardware. Packet capture, threat feed, and user behavior are types of data that can help identify malicious activities or indicators of compromise, but not necessarily the systems that are vulnerable to exploitation.
Margot
5 months agoAlberto
5 months agoCarlota
5 months agoNiesha
5 months agoVal
6 months agoCarlota
6 months agoJerry
6 months agoMarguerita
7 months agoWillis
7 months agoJerry
7 months agoAllene
8 months agoKenny
8 months agoMatthew
7 months agoBettina
7 months agoNichelle
7 months agoJanna
8 months agoVicky
8 months agoFrankie
8 months agoSon
8 months agoEmerson
7 months agoQueenie
7 months agoBrandon
8 months agoJessenia
8 months agoJoanne
8 months agoNieves
8 months agoMerilyn
8 months agoAugustine
8 months agoSerita
8 months agoPearline
8 months agoTrevor
8 months ago