Q: 12
A security analyst for a financial services firm is monitoring blogs and reads about a zero-day
vulnerability being exploited by a little-known group of hackers. The analyst wishes to independently
validate and corroborate the blog’s posting. Whichof the following sources of information will
provide the MOST credible supporting threat intelligence in this situation?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.