Which phase of the threat hunting process involves analyzing security logs, network traffic, and endpoint data?
A . Data Collection
B . Data Processing
C . Data Analysis
D . Data Visualization
Answer: C
Latest 300-220 Dumps Valid Version with 130 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund