Which of the following is an example of an active threat hunting technique?
A . Conducting regular vulnerability scans
B . Reviewing security logs after an incident
C . Monitoring network traffic in real-time
D . Waiting for alerts from automated security tools
Answer: C
Latest 300-220 Dumps Valid Version with 130 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund