Which of the following threat intelligence helps cyber security professionals such as security operations managers, network operations center and incident responders to understand how the adversaries are expected to perform the attack on the organization, and the technical capabilities and goals of the attackers along with the attack vectors?

Which of the following threat intelligence helps cyber security professionals such as security operations managers, network operations center and incident responders to understand how the adversaries are expected to perform the attack on the organization, and the technical capabilities and goals of the attackers along with the attack vectors?A . Analytical Threat IntelligenceB ....

Where will Harley find the web server logs, if he wants to investigate them for any anomalies?

Harley is working as a SOC analyst with Powell Tech. Powell Inc. is using Internet Information Service (IIS) version 7.0 to host their website. Where will Harley find the web server logs, if he wants to investigate them for any anomalies?A . SystemDrive%inetpublogsLogFilesW3SVCNB . SystemDrive%LogFilesinetpublogsW3SVCNC . %SystemDrive%LogFileslogsW3SVCND . SystemDrive% inetpubLogFileslogsW3SVCN View Answer Answer: A...

What does these TTPs refer to?

Properly applied cyber threat intelligence to the SOC team help them in discovering TTPs. What does these TTPs refer to?A . Tactics, Techniques, and ProceduresB . Tactics, Threats, and ProceduresC . Targets, Threats, and ProcessD . Tactics, Targets, and Process View Answer Answer: A Explanation: Reference: https://www.crest-approved.org/wp-content/uploads/CREST-Cyber-Threat-Intelligence.pdf...