- All Exams Instant Download
Which of the following techniques would be BEST for the hunt team to use to entice the adversary to uncover malicious activity?
An organization’s hunt team thinks a persistent threats exists and already has a foothold in the enterprise network.
Which of the following techniques would be BEST for the hunt team to use to entice the adversary to uncover malicious activity?
A . Deploy a SOAR tool.
B . Modify user password history and length requirements.
C . Apply new isolation and segmentation schemes.
D . Implement decoy files on adjacent hosts.
Answer: C
Explanation:
Reference: https://www.cynet.com/network-attacks/network-attacks-and-network-security-threats/
Latest CAS-004 Dumps Valid Version with 128 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments