5.1.1 Explain the purpose and use of the IOC technique
Indicators of compromise (IOCs) are the artifacts that are considered malicious or suspicious. IOCs are static and based on criteria such as:
● Full path
● File name
● Domain
● Destination IP address
● MD5 hash
● SHA-256
upvoted 3 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Chiquitabandita
4 months agoKarreldanam
1 year, 1 month ago