CompTIA CySA+ CS0-003 Practice Question
During a threat hunting operation, which of the following would be the BEST focus area to ensure the protection of sensitive information while simultaneously detecting potential unauthorized access?
Monitoring of isolated networks disconnected from the internet
Deployment of honeypots within the network
Business-critical assets and processes
Misconfigurations of software and hardware components