1
answer
1
watching
228
views

An organization's hunt team thinks a persistent threats exists and already has a foothold in the enterprise network.

Which of the following techniques would be BEST for the hunt team to use to entice the adversary to uncover malicious activity?

Options:

A Deploy a SOAR tool.
B Modify user password history and length requirements.
C Apply new isolation and segmentation schemes.
D Implement decoy files on adjacent hosts.    

NOTE : someone is saying the answer C and other is saying D ... I am confused .. Please help to guide with the correct answer with the justification 

For unlimited access to Homework Help, a Homework+ subscription is required.

Avatar image
Liked by aminul2005 and 2 others

Unlock all answers

Get 1 free homework help answer.
Already have an account? Log in

Related questions

Weekly leaderboard

Start filling in the gaps now
Log in