Question: ABC Technologies had its computer network compromised through a cybersecurity breach. A cybersecurity expert was employed to analyze and sdeatify what caused the attack and

ABC Technologies had its computer network compromised through a cybersecurity breach. A cybersecurity
expert was employed to analyze and sdeatify what caused the attack and the damage cauved by the attack. He
checked an available database for this purpose and found the threat actor behind the attack. He also found out
the cybercriminal has been aftempting to sell the company's valuable data on the interset
Which are the most probable methods used by the cybersecurity expert to get to this stage of the
investigation?
The cybersecurity expert checked with CISCP and also investigated the dark web.
The eybersecurity expert checked the thrent maps and used TAXII
The cyberiecurity expert checked the threat maps and used the MAR zcpoet.
The cybernecurity expert used STLX and checked with CISCP.
ABC Technologies had its computer network

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!