nerdexam
EC-CouncilEC-Council

212-82 · Question #99

212-82 Question #99: Real Exam Question with Answer & Explanation

Sign in or unlock 212-82 to reveal the answer and full explanation for question #99. The question stem and answer options stay visible for context.

Submitted by parkjh· Mar 6, 2026Cloud Security Operations & Incident Response

Question

Mark, a security analyst, was tasked with performing threat hunting to detect imminent threats in an organization's network. He generated a hypothesis based on the observations in the initial step and started the threat-hunting process using existing data collected from DNS and proxy logs. Identify the type of threat-hunting method employed by Mark in the above scenario.

Options

  • AEntity-driven hunting
  • BTTP-driven hunting
  • CData-driven hunting
  • DHybrid hunting

Unlock 212-82 to see the answer

You've previewed enough free 212-82 questions. Unlock 212-82 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.

Topics

#Threat hunting#Security operations#Data-driven hunting#Log analysis
Full 212-82 PracticeBrowse All 212-82 Questions