header bg

Scan QR code or get instant email to install app

Question:

Unusual outbound network traffic, geographical irregularities, and increases in database read volumes are all examples of which of the following main elements of threat intelligence?

A Indicators of compromise.
explanation

There are many indicators of compromise (IoCs), including unusual outbound network traffic, geographical irregularities like logins from a country where the person normally does not work, or increases in database read volumes beyond normal traffic patterns. Predictive analysis is analysis work done using datasets to attempt to determine trends and likely attack vectors so that analysts can focus their efforts where they will be most needed and effective. OSINT is open-source intelligence, and threat maps are often real-time or near real-time visualizations of where threats are coming from and where they are headed to.

Related Information

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

*