New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Fortinet NSE 7 - Security Operations 7.6 Architect NSE7_SOC_AR-7.6 Question # 6 Topic 1 Discussion

Fortinet NSE 7 - Security Operations 7.6 Architect NSE7_SOC_AR-7.6 Question # 6 Topic 1 Discussion

NSE7_SOC_AR-7.6 Exam Topic 1 Question 6 Discussion:
Question #: 6
Topic #: 1

Refer to the exhibits.

What can you conclude from analyzing the data using the threat hunting module?


A.

Spearphishing is being used to elicit sensitive information.


B.

DNS tunneling is being used to extract confidential data from the local network.


C.

Reconnaissance is being used to gather victim identity information from the mail server.


D.

FTP is being used as command-and-control (C&C) technique to mine for data.


Get Premium NSE7_SOC_AR-7.6 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.