Because it accepts firewall and intrusion logs from many sources, ____ is often one of the first organizations to spot network anomalies, and it often traces them to specific malware or vulnerability exploits.
A. Microsoft
B. the ISC
C. Mitre
D. ISACs
Answer: B
Computer Science & Information Technology