Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Exam 212-82 All Questions
Exam 212-82 All Questions

View all questions & answers for the 212-82 exam

ECCouncil Cyber Technician (CCT) 212-82 Question # 36 Topic 3 Discussion

212-82 Exam Topic 3 Question 36 Discussion:
Question #: 36
Topic #: 3

Mark, a security analyst, was tasked with performing threat hunting to detect imminent threats in an organization's network. He generated a hypothesis based on the observations in the initial step and started the threat-hunting process using existing data collected from DNS and proxy logs.

Identify the type of threat-hunting method employed by Mark in the above scenario.


A.

Entity-driven hunting


B.

TTP-driven hunting


C.

Data-driven hunting


D.

Hybrid hunting


Get Premium 212-82 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.