Question: During a routine threat hunting exercise, a security analyst identifies suspicious behavior indicating a potential data exfiltration attempt. The analyst decides to leverage machine learning
During a routine threat hunting exercise, a security analyst identifies suspicious behavior indicating a potential data exfiltration attempt. The analyst decides to leverage machine learning algorithms to detect deviations in user behavior and identify the anomalous activity. Which technique is the analyst most likely employing?
Automated Threat Hunting Pipelines
Baseline Normal traffic
User and Entity Behavior Analytics UEBA
Malware Analysis
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
