1.

_____________ is used for identification and prevention of cyber intrusions.

Answer»

_____________ is USED for identification and PREVENTION of cyber intrusions.
Choose the correct option from below list
(1)Hunting MATURITY model
(2)Hunting Matrix
(3)Cyber kill CHAIN
(4)Hunting loop

Answer:-(3)Cyber kill chain



Discussion

No Comment Found