Mark, a security analyst, was tasked with performing threat hunting to detect imminent threats in an organization's network. He generated a hypothesis based on the observations in the initial step and started the threat-hunting process using existing data collected from DNS and proxy logs.
Identify the type of threat-hunting method employed by Mark in the above scenario.
Joni
7 days agoMeaghan
8 days agoEileen
17 days agoStevie
18 days agoMichael
18 days agoSantos
19 days agoHobert
25 days ago