ECCouncil Certified Threat Intelligence Analyst (CTIA) 312-85 Question # 12 Topic 2 Discussion

ECCouncil Certified Threat Intelligence Analyst (CTIA) 312-85 Question # 12 Topic 2 Discussion

312-85 Exam Topic 2 Question 12 Discussion:
Question #: 12
Topic #: 2

Miley, an analyst, wants to reduce the amount of collected data and make the storing and sharing process easy. She uses filtering, tagging, and queuing technique to sort out the relevant and structured data from the large amounts of unstructured data.

Which of the following techniques was employed by Miley?


A.

Sandboxing


B.

Normalization


C.

Data visualization


D.

Convenience sampling


Get Premium 312-85 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.