Which of the follow...
 
Notifications
Clear all

Which of the following methods would be MOST appropriate to use?

1 Posts
1 Users
0 Likes
148 Views
(@benninkcarrol)
Noble Member
Joined: 2 years ago
Posts: 687
Topic starter  

A security analyst needs to develop a brief that will include the latest incidents and the attack phases of the incidents. The goal is to support threat intelligence and identify whether or not the incidents are linked.

Which of the following methods would be MOST appropriate to use?

  • A . An adversary capability model
  • B . The MITRE ATT&CK framework
  • C . The Cyber Kill Chain
  • D . The Diamond Model of Intrusion Analysis

Show Answer Hide Answer

Suggested Answer: B

   
Quote
Topic Tags

Latest CompTIA CS0-002 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: