Which of the following is the researcher MOST likely using?
A security researcher is tracking an adversary by noting its attacks and techniques based on its capabilities, infrastructure, and victims.
Which of the following is the researcher MOST likely using?
A . The Diamond Model of Intrusion Analysis
B. The Cyber Kill Chain
C. The MITRE CVE database
D. The incident response process
Answer: A
Explanation:
The Diamond Model is a framework for analyzing cyber threats that focuses on four key elements:
adversary, capability, infrastructure, and victim. By analyzing these elements, security researchers
can gain a better understanding of the threat landscape and develop more effective security strategies.
Latest SY0-601 Dumps Valid Version with 396 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
                             Subscribe
                            
                        
                                            
                             Login                        
                    
                        0 Comments                    
                                        
                     Inline Feedbacks                    
                    View all comments