How can SOC analysts use the cyber kill chain?
A. to gain insight into an attacker’s tactics and techniques
B. to delete detected malware
C. to prevent all types of cyber attacks
D. to require attackers to follow all phases of the cyber kill chain in sequence
E. to implement additional security controls at the network level