Question 16
A team of threat intelligence analysts is performing threat analysis on malware, and each of them has come up with their own theory and evidence to support their theory on a given malware.
Now, to identify the most consistent theory out of all the theories, which of the following analytic processes must threat intelligence manager use?
Now, to identify the most consistent theory out of all the theories, which of the following analytic processes must threat intelligence manager use?