Which threat detection technique is best suited for identifying anomalies in network behavior?
Signature-based detection
Heuristic analysis
Behavioral analysis
Anomaly detection

Incident Response Exercises are loading ...