Answer:
Analyze network traffic
Identify the method of execution
Explanation:
Threat Hunting is a form of cybersecurity strategy carefully formulated to recognize threats that are yet to be found by routine security monitoring.
Using the approach of Threat hunting means applying unconventional techniques to determine the threats or find the origin of the malware.
Hence, in this case, the system engineer should carry out the following steps:
1. Analyze network traffic
2. Identify the method of execution
The correct answer is:
<span>an article from the New York Times</span>a book by an educational researcher and professor<span>a report from the US Department of Education at www.ed.gov</span>
It would be the last statement because 3 is greater than 0 but it does not equal 1 or 2 like the first two statements.
It opens a different article depending on what program you on, to accommodate that program.