6
answers
1
watching
132
views
myrrcenaryLv1
25 May 2023
An organization's hunt team thinks a persistent threats exists and already has a foothold in the enterprise network.
Which of the following techniques would be BEST for the hunt team to use to entice the adversary to uncover malicious activity?
- Deploy a SOAR tool.
- Modify user password history and length requirements.
- Apply new isolation and segmentation schemes.
- Implement decoy files on adjacent hosts.
An organization's hunt team thinks a persistent threats exists and already has a foothold in the enterprise network.
Which of the following techniques would be BEST for the hunt team to use to entice the adversary to uncover malicious activity?
- Deploy a SOAR tool.
- Modify user password history and length requirements.
- Apply new isolation and segmentation schemes.
- Implement decoy files on adjacent hosts.
Liked by myrrcenary and 3 others
Liked by myrrcenary and 3 others
25 May 2023
Already have an account? Log in
Liked by myrrcenary and 1 others
25 May 2023
Already have an account? Log in
Liked by myrrcenary and 1 others
Read by 1 person
qamarmalik3098Lv10
25 May 2023
Already have an account? Log in
Read by 1 person
guruprasadLv3
25 May 2023
Already have an account? Log in