- fortinet-fcss-soc-an-7.4-exam-questions-36
Search  

fortinet-fcss-soc-an-7.4-exam-questions-36 
Download
Security_Operations_7.4_Analyst_Exam_Description.pdf

Question :36

立即產生短網址

Refer to the exhibits.


What can you conclude from analyzing the data using the threat hunting module?
A. Spearphishing is being used to elicit sensitive information.
B. DNS tunneling is being used to extract confidential data from the local network.
C. Reconnaissance is being used to gather victim identity information from the mail server.
D. FTP is being used as command-and-control (C&C) technique to mine for data.

TOP


















Ans:B

[ add comment ]   |  permalink  |  print article  |  related link  |   ( 2.9 / 73 )

<<First <Back | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | Next> Last>>