Mark, a security analyst, was tasked with performing threat hunting to detect imminent threats in an organization's network. He generated a hypothesis based on the observations in the initial step and started the threat-hunting process using existing data collected from DNS and proxy logs.
Identify the type of threat-hunting method employed by Mark in the above scenario.
Thurman
2 months agoSophia
15 days agoHoward
1 months agoUla
1 months agoJoni
2 months agoBlythe
7 days agoJennifer
8 days agoWillie
9 days agoDomonique
30 days agoMelinda
1 months agoAliza
1 months agoBok
2 months agoFloyd
2 months agoMeaghan
2 months agoEileen
3 months agoStevie
3 months agoAngelica
27 days agoIlene
1 months agoAleta
2 months agoAhmad
2 months agoMichael
3 months agoSantos
3 months agoHobert
3 months ago