ethical-hacker video for during a simulated attack on a network, a response team uses AI tools to detect and mitigate threats. Which strategy would best help in
During a simulated attack on a network, a response team uses AI tools to detect and mitigate threats. Which strategy would best help in identifying latent threats that have bypassed initial defenses?