115k views
3 votes
A Department of Defense (DoD) security team identifies a data breach in progress, based on some anomalous log entries, and take steps to remedy the breach and harden their systems. When they resolve the breach, they want to publish the cyber threat intelligence (CTI) securely, using standardized language for other government agencies to use. The team will transmit threat data feed via which protocol

1 Answer

4 votes

Answer: no se

Step-by-step explanation:

User Neits
by
3.7k points