We've detected that Javascript is not enabled. It is required for an optimal survey taking experience. Please check your browser's settings and make sure Javascript is turned on. Learn how to enable Javascript.
4. A threat hunter is searching for malicious activity on a corporate network. Which of the following might they use to guide their efforts? (Choose two)