You are the leading cybersecurity analyst at financial institutions. An anomaly is detected in the network, suggesting a potential security threat. To proactively investigate and mitigate the risk, arrange the following steps in the correct sequence as part of the threat hunting process:
1) Investigation
2) Collect and process data
3) Response
4) Hypothesis
5) Trigger
a) 5 –> 3 –> 1 –> 4 –> 2
b) 3 –> 2 –> 5 –> 1 –> 4
c) 4 –> 1 –> 3 –> 5 –> 2
d) 4 –> 2 –> 5 –> 1 –> 3
RAMI_PAL
4 days, 4 hours agoc29a12d
1 week, 3 days agoc29a12d
1 week, 3 days ago7119c34
2 weeks, 5 days ago