Which of the following is an example of a threat modeling technique?
Which of the following is an example of a threat modeling technique?A . Attack surface analysisB . Vulnerability scanningC . Patch managementD . Intrusion detectionView AnswerAnswer: A
What is the main focus of signature-based threat hunting techniques?
What is the main focus of signature-based threat hunting techniques?A . Identifying new, unknown threatsB . Matching known patterns and indicators of compromiseC . Utilizing machine learning algorithms for threat detectionD . Analyzing network traffic anomaliesView AnswerAnswer: B
In threat hunting techniques, what is the purpose of decoy systems?
In threat hunting techniques, what is the purpose of decoy systems?A . To deceive attackers by providing false informationB . To restrict access to sensitive dataC . To monitor system performanceD . To analyze network trafficView AnswerAnswer: A
What is the goal of the containment phase in the threat hunting process?
What is the goal of the containment phase in the threat hunting process?A . Identify potential vulnerabilitiesB . Isolate affected systemsC . Analyze threat indicatorsD . Create incident reportsView AnswerAnswer: B
Which of the following is NOT a step in the Elevation of Privilege (EoP) threat model technique?
Which of the following is NOT a step in the Elevation of Privilege (EoP) threat model technique?A . Identifying trust boundariesB . Identifying potential attack surfacesC . Analyzing the impact of security vulnerabilitiesD . Assessing potential privilege escalation scenariosView AnswerAnswer: C
What is the purpose of using a sandbox environment in threat hunting?
What is the purpose of using a sandbox environment in threat hunting?A . To punish malicious actorsB . To isolate and analyze potentially harmful files or codeC . To provide a safe space for employees to test new softwareD . To restrict access to sensitive informationView AnswerAnswer: B
When conducting threat hunting, what should cybersecurity professionals prioritize?
When conducting threat hunting, what should cybersecurity professionals prioritize?A . Identifying and remediating all vulnerabilities in the networkB . Identifying and responding to active threats in the networkC . Monitoring network traffic for compliance purposesD . Conducting regular security training for employeesView AnswerAnswer: B
What is the significance of gaining visibility into the network as part of threat hunting?
What is the significance of gaining visibility into the network as part of threat hunting?A . It ensures that all threats are immediately neutralizedB . It allows for the detection of abnormal behavior or signs of compromiseC . It requires organizations to limit access to security logsD . It prevents...
Which phase of the threat hunting process involves applying threat intelligence and context to detected threats?
Which phase of the threat hunting process involves applying threat intelligence and context to detected threats?A . AnalysisB . InvestigationC . AttributionD . RemediationView AnswerAnswer: C
Which phase of the threat hunting process involves analyzing security logs, network traffic, and endpoint data?
Which phase of the threat hunting process involves analyzing security logs, network traffic, and endpoint data?A . Data CollectionB . Data ProcessingC . Data AnalysisD . Data VisualizationView AnswerAnswer: C