PdfPrep.com

Which of the following frameworks would BEST apply in this situation?

A cybersecurity analyst is dissecting an intrusion down to the specific techniques and wants to organize them in a logical manner.

Which of the following frameworks would BEST apply in this situation?
A . Pyramid of Pain
B . MITRE ATT&CK
C . Diamond Model of Intrusion Analysts
D . CVSS v3.0

Answer: B

Exit mobile version