6
answers
1
watching
132
views

An organization's hunt team thinks a persistent threats exists and already has a foothold in the enterprise network.

Which of the following techniques would be BEST for the hunt team to use to entice the adversary to uncover malicious activity?

  1. Deploy a SOAR tool.
  2. Modify user password history and length requirements.
  3. Apply new isolation and segmentation schemes.
  4. Implement decoy files on adjacent hosts.

For unlimited access to Homework Help, a Homework+ subscription is required.

Avatar image
Liked by myrrcenary and 3 others

Unlock all answers

Get 1 free homework help answer.
Already have an account? Log in
Avatar image
Liked by myrrcenary and 3 others
Already have an account? Log in
Avatar image
Liked by myrrcenary and 1 others
Already have an account? Log in
Avatar image
Liked by myrrcenary and 1 others
Already have an account? Log in
Avatar image
Read by 1 person
Already have an account? Log in
Avatar image
Read by 1 person
Already have an account? Log in

Related questions

Weekly leaderboard

Start filling in the gaps now
Log in