A cybersecurity analyst is investigating a suspected Advanced Persistent Threat (APT) on a corporate network. The attacker has been inside the network for several months, stealthily exfiltrating data and avoiding detection by using legitimate administrative tools. What is the most effective method to detect and mitigate this attack?
Correct Answer: Conduct threat hunting and implement endpoint detection and response (EDR) solutions
Explanation: APTs are sophisticated, long-term threats that evade traditional security measures. Threat hunting involves proactively searching for indicators of compromise (IoCs), while EDR solutions monitor and respond to suspicious activity in real-time.
Correct Answer: Conduct threat hunting and implement endpoint detection and response (EDR) solutions
Explanation: APTs are sophisticated, long-term threats that evade traditional security measures. Threat hunting involves proactively searching for indicators of compromise (IoCs), while EDR solutions monitor and respond to suspicious activity in real-time.