During a threat hunting exercise, which focus area is MOST likely to help you identify indicators of compromise (IoCs) related to a sophisticated attack targeting financial systems?
Monitoring business-critical assets and processes
Reviewing isolated networks for unusual activity
Examining network configurations for potential misconfigurations
Analyzing external threat feeds and intelligence