Answered step by step
Verified Expert Solution
Question
1 Approved Answer
A Department of Defense ( DOD ) security team identifies a data breach in progress, based on some anomalous log entries, and take steps to
A Department of Defense DOD security team identifies a data breach in progress, based on some anomalous log entries, and take steps to remedy the breach and harden their systems. When they resolve the breach, they want to publish the cyber threat intelligence CTI securely using standardized language for other government agencies to use. The team will transmit threat data feed via which protocol?
A Structured Threat Information eXpression STIX
B Automated Indicator Sharing AIS
C Trusted Automated eXchange of Indicator Information TAXII
D A code repository protocol
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started