Question 42:
A company`s SOC has received threat intelligence about an active campaign utilizing a specific vulnerability. The company would like to determine whether it is vulnerable to this active campaign. Which of the following should the company use to make this determination?
Answer options:
A. Threat hunting B. A system penetration test C. Log analysis within the SIEM tool D. The Cyber Kill Chain