✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.
Real Intelligence Threat Analytics (RITA) detects known and yetundiscovered attacker C2. What is the type of input that should be passed to RITA?