A security operations center wants to implement a solution that can execute files to test for malicious activity.
The solution should provide a report of the files' activity against known threats. Which of the following should
the security operations center implement?
A. the Harvester
B. Nessus
C. Cuckoo
D. Sn1per
The solution should provide a report of the files' activity against known threats. Which of the following should
the security operations center implement?
A. the Harvester
B. Nessus
C. Cuckoo
D. Sn1per