Question: ABC Technologies had its computer network compromised through a cybersecurity breach. A cybersecurity expert was employed to analyze and sdeatify what caused the attack and
ABC Technologies had its computer network compromised through a cybersecurity breach. A cybersecurity
expert was employed to analyze and sdeatify what caused the attack and the damage cauved by the attack. He
checked an available database for this purpose and found the threat actor behind the attack. He also found out
the cybercriminal has been aftempting to sell the company's valuable data on the interset
Which are the most probable methods used by the cybersecurity expert to get to this stage of the
investigation?
The cybersecurity expert checked with CISCP and also investigated the dark web.
The eybersecurity expert checked the thrent maps and used TAXII
The cyberiecurity expert checked the threat maps and used the MAR zcpoet.
The cybernecurity expert used STLX and checked with CISCP.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
