Mark, a security analyst, was tasked with performing threat hunting to detect imminent threats in an organization's network. He generated a hypothesis based on the observations in the initial step and started the threat-hunting process using existing data collected from DNS and proxy logs.
Identify the type of threat-hunting method employed by Mark in the above scenario.
Cory
4 months agoWilletta
4 months agoHassie
4 months agoReyes
4 months agoLanie
5 months agoCassie
5 months agoBarbra
5 months agoDean
5 months agoBasilia
5 months agoHyman
5 months agoPaulene
5 months agoAudry
6 months agoGeorgeanna
6 months agoGiuseppe
6 months agoThurman
10 months agoSophia
9 months agoHoward
10 months agoUla
10 months agoJoni
11 months agoBlythe
9 months agoJennifer
9 months agoWillie
9 months agoDomonique
9 months agoMelinda
10 months agoAliza
10 months agoBok
10 months agoFloyd
10 months agoMeaghan
11 months agoEileen
11 months agoStevie
11 months agoAngelica
9 months agoIlene
10 months agoAleta
10 months agoAhmad
11 months agoMichael
11 months agoSantos
11 months agoHobert
11 months ago