You are the leading cybersecurity analyst at financial institutions. An anomaly is detected in the network, suggesting a potential security threat. To proactively investigate and mitigate the risk, arrange the following steps in the correct sequence as part of the threat hunting process:
1) Investigation
2) Collect and process data
3) Response
4) Hypothesis
5) Trigger
a) 5 –> 3 –> 1 –> 4 –> 2
b) 3 –> 2 –> 5 –> 1 –> 4
c) 4 –> 1 –> 3 –> 5 –> 2
d) 4 –> 2 –> 5 –> 1 –> 3
DTsg
5 days, 14 hours agomamoru
6 months, 1 week agoRAMI_PAL
1 year agoc29a12d
1 year agoc29a12d
1 year ago7119c34
1 year ago