A security analyst is using a recently released security advisory to review historical logs, looking for the specific activity that was outlined in the advisory.
Which of the following is the analyst doing?
A . A packet capture
B . A user behavior analysis
C . Threat hunting
D . Credentialed vulnerability scanning
Answer: D