ECCouncil 312-39 Question Answer
TechInnovate receives an alert about a newly discovered zero-day vulnerability in a widely used web application framework that is being actively exploited. No official patch is available. The SOC must monitor adversary tactics, identify indicators of compromise (IoCs), and proactively adjust controls to detect, track, and mitigate the threat. Which SOC technology is crucial for real-time visibility into evolving threat intelligence and enabling proactive mitigation?

