Q: 5
Jian is a member of the security team at Trinity, Inc. He was conducting a real-time assessment of
system activities in order to acquire threat intelligence feeds. He acquired feeds from sources like
honeynets, P2P monitoring. infrastructure, and application logs.
Which of the following categories of threat intelligence feed was acquired by Jian?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.