1
answer
1
watching
228
views
aminul2005Lv1
2 Feb 2022
An organization's hunt team thinks a persistent threats exists and already has a foothold in the enterprise network.
Which of the following techniques would be BEST for the hunt team to use to entice the adversary to uncover malicious activity?
Options:
A Deploy a SOAR tool.
B Modify user password history and length requirements.
C Apply new isolation and segmentation schemes.
D Implement decoy files on adjacent hosts.
NOTE : someone is saying the answer C and other is saying D ... I am confused .. Please help to guide with the correct answer with the justification
An organization's hunt team thinks a persistent threats exists and already has a foothold in the enterprise network.
Which of the following techniques would be BEST for the hunt team to use to entice the adversary to uncover malicious activity?
Options:
A Deploy a SOAR tool.
B Modify user password history and length requirements.
C Apply new isolation and segmentation schemes.
D Implement decoy files on adjacent hosts.
NOTE : someone is saying the answer C and other is saying D ... I am confused .. Please help to guide with the correct answer with the justification
1
answer
1
watching
228
views
For unlimited access to Homework Help, a Homework+ subscription is required.
Liked by aminul2005 and 2 others