212-82 · Question #99
212-82 Question #99: Real Exam Question with Answer & Explanation
Sign in or unlock 212-82 to reveal the answer and full explanation for question #99. The question stem and answer options stay visible for context.
Question
Mark, a security analyst, was tasked with performing threat hunting to detect imminent threats in an organization's network. He generated a hypothesis based on the observations in the initial step and started the threat-hunting process using existing data collected from DNS and proxy logs. Identify the type of threat-hunting method employed by Mark in the above scenario.
Options
- AEntity-driven hunting
- BTTP-driven hunting
- CData-driven hunting
- DHybrid hunting
Unlock 212-82 to see the answer
You've previewed enough free 212-82 questions. Unlock 212-82 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.