What is one of the ways in which the cyber kill chain is used by an SOC?
A . ensure that attackers do not complete all stages of the kill chain
B . to measure analytic completeness
C . to help determine behavior on an per incident basis
D . to identify and delete detected malware
Answer: B