Clemenza has just finished threat hunting within his company's infrastructure and come up with a list of tasks that would help secure the assets and data being stored. Which of the following might he do as a result of the threat hunting? a. Profile threat actors and activities. b. Reduce the attack surface area. c. Deploy IoCs to vulnerable systems and devices. d. Implement the principle of least privilege.
Clemenza has just finished threat hunting within his company's infrastructure and come up with a list of tasks that would help secure the assets and data being stored. Which of the following might he do as a result of the threat hunting? a. Profile threat actors and activities. b. Reduce the attack surface area. c. Deploy IoCs to vulnerable systems and devices. d. Implement the principle of least privilege.
Related questions
Question
Clemenza has just finished threat hunting within his company's infrastructure and come up with a list of tasks that would help secure the assets and data being stored. Which of the following might he do as a result of the threat hunting?
|
|||
|
|||
|
|||
|
AI-Generated Solution
AI-generated content may present inaccurate or offensive content that does not represent bartleby’s views.
Unlock instant AI solutions
Tap the button
to generate a solution