____________ is NOT part of the threat hunting loop.

Creating the Hypothesis

Attacking the attacker

Inform and enrich analytics

Uncover new patterns and TPPs

Verified Answer
Correct Option - b

To get all Infosys Certified Ethical Hacker Exam questions Join Telegram Group https://rebrand.ly/lex-telegram-236dee

Telegram