You are the leading cybersecurity analyst at financial institutions. An anomaly is detected in the network, suggesting a potential security threat. To proactively investigate and mitigate the risk, arrange the following steps in the correct sequence as part of the threat hunting process:
1) Investigation
2) Collect and process data
3) Response
4) Hypothesis
5) Trigger
a) 5 –> 3 –> 1 –> 4 –> 2
b) 3 –> 2 –> 5 –> 1 –> 4
c) 4 –> 1 –> 3 –> 5 –> 2
d) 4 –> 2 –> 5 –> 1 –> 3
mamoru
1 month, 2 weeks agoRAMI_PAL
7 months, 2 weeks agoc29a12d
7 months, 3 weeks agoc29a12d
7 months, 3 weeks ago7119c34
8 months ago