in Technology by

Threat hunters use __________.

       A. Automated tools

       B. Manual methods

       C. Both the options

       D. None of the options

1 Answer

0 votes
by

Threat hunters use  Automated tools and Manual methods.

       

   Ans : Both the options

Related questions

0 votes
    Threat hunters will be able to offer a high degree of protection only if there is a _____________. A. Moderate level of ... . Low level of visibility into networks D. None of these...
asked Feb 26, 2023 in Technology by JackTerrance
0 votes
    Which of the following is the cyber threat intelligence model that have been widely used in the industry? A. The Diamond Model ... Chain C. None of the options D. Both the options...
asked Feb 26, 2023 in Technology by JackTerrance
0 votes
    Which threat hunting platform was acquired by Amazon Web Services? A. Maltego B. Exabeam C. Vectra D. Sqrrl...
asked Feb 26, 2023 in Technology by JackTerrance
0 votes
    Which of the following are threat hunting techniques? A. Stack counting B. Clustering C. Grouping D. All the Options...
asked Feb 26, 2023 in Technology by JackTerrance
0 votes
    Which of the following are threat hunting platforms? A. Sqrrl B. Infocyte C. Endgame Inc D. Vectra E. All the Options...
asked Feb 26, 2023 in Technology by JackTerrance
0 votes
    What is Piggybank? a)It’s a framework b)It’s a platform c)It’s a repository d)None of the options....
asked Apr 28, 2021 in Technology by JackTerrance
0 votes
    Types of change request. A. Workbench Request B. Customizing Request C. Both D. None of these...
asked Feb 20, 2023 in Technology by JackTerrance
0 votes
    Which of the following browser supports HTML5 in its latest version? A - Mozilla Firefox B - Opera C - Both of the above. D - None of the above....
asked Dec 1, 2020 in Technology by JackTerrance
0 votes
    computer has very large…….? a. memory b.speed c. both a & b d.none of the above Select the correct answer from above options...
asked Dec 15, 2021 in Education by JackTerrance
0 votes
    What type of authentication attackers can detect via manual means and exploit them, using automated tools with password lists and dictionary attacks?...
asked Mar 20, 2021 in Technology by JackTerrance
0 votes
    Point out the correct statement. (a) Slidify allows embedded code chunks (b) Slidify presentation cannot be shared easily (c) Slidify is difficult to use (d) None of the mentioned...
asked Oct 7, 2021 in Technology by JackTerrance
0 votes
    _____________ is used for identification and prevention of cyber intrusions. A. Hunting maturity model B. Cyber kill chain C. Hunting loop D. Hunting Matrix...
asked Feb 26, 2023 in Technology by JackTerrance
0 votes
    Approximate amount spent on security detection and defense technologies to identify and stop advanced threats is _______. A. $850000 B. $750000 C. $650000 D. $550000...
asked Feb 26, 2023 in Technology by JackTerrance
0 votes
    Point out the correct statement. (a) shiny project is a directory containing at least three parts (b) shiny project ... directory containing only one part (d) none of the mentioned...
asked Oct 9, 2021 in Technology by JackTerrance
0 votes
    internet is network of computer networks ? a. all over the state b. all over the country c. all over the world d. none of the above Select the correct answer from above options...
asked Dec 22, 2021 in Education by JackTerrance
...