CompTIA CySA+ CS0-003 Practice Question
Which of the following actions is MOST crucial when beginning threat hunting efforts, focusing on the protection of assets vital to the company's core functionality?
Continuously review access logs for all systems to immediately identify unauthorized access to business-critical assets.
Keep regular backups of all systems to quickly restore any compromised business-critical assets.
Create a comprehensive inventory of all business-critical assets to ensure they are prioritized in hunting activities.
Ensure that all systems are regularly updated to the latest security patches regardless of their business criticality.