Looking for IT8510 - Threat Intelligence and Hunting test answers and solutions? Browse our comprehensive collection of verified answers for IT8510 - Threat Intelligence and Hunting at moodle.polytechnic.bh.
Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!
You are working as a SOC analyst and receive an alert from your SIEM indicating the execution of a PowerShell command on a user workstation. Further investigation reveals that the command silently downloads a script from a remote IP and executes it in memory without writing to disk. You suspect this may be part of a living-off-the-land technique used by advanced attackers. How does the MITRE ATT&CK framework most effectively assist in analyzing this situation?