0 votes
in Internet of Things IoT by
edited by
Threat hunters use __________.

i) None of the options

ii) Manual methods

iii) Both the options

iv) Automated tools

1 Answer

0 votes
by
edited by
Both the options

Threat hunters use software and tools to find suspicious activities. There are three main categories of solutions and tools:

a) Security monitoring tools—tools such as firewalls, antivirus, and endpoint security solutions collect security data and monitor the network.

b) SIEM solutions—security information and event management (SIEM) help manage the raw security data and provide real-time analysis of security threats.

c) Analytics tools—statistical and intelligence analysis software. These tools provide a visual report through interactive charts and graphs, making it easier to correlate entities and detect patterns.

Related questions

0 votes
asked May 1, 2020 in Internet of Things IoT by SakshiSharma
0 votes
asked Apr 28, 2020 in Internet of Things IoT by SakshiSharma
...