| Threat hunters should mainly focus on which of the following things?
Choose the correct option from below list
(1)Doubtful areas Plain credentials Slow and low connections
(2)Plain credentials
(3)Doubtful areas
(4)Slow and low connections
(5)Different number of bytes in and out
Answer:-(1)Doubtful areas Plain credentials Slow and low connections | | |