Which of the following is an example of an active threat hunting technique?
A . Monitoring inbound and outbound network traffic
B . Waiting for alerts to trigger before taking action
C . Conducting regular vulnerability scans without analysis
D . Relying solely on automated threat detection tools
Answer: A
Latest 300-220 Dumps Valid Version with 130 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund