What is the purpose of threat modeling in the context of cybersecurity?
What is the purpose of threat modeling in the context of cybersecurity?A . Identifying specific threatsB . Prioritizing cybersecurity risksC . Designing secure systemsD . Generating attack vectorsView AnswerAnswer: B
Which technique involves analyzing the digital artifacts left behind by threat actors in order to attribute cyber attacks?
Which technique involves analyzing the digital artifacts left behind by threat actors in order to attribute cyber attacks?A . Linguistic analysisB . Infrastructure analysisC . Behavioral analysisD . Digital forensicsView AnswerAnswer: D
During threat hunting, what is the key focus of threat intelligence?
During threat hunting, what is the key focus of threat intelligence?A . Predicting future threatsB . Identifying potential threatsC . Responding to known threatsD . Denying access to the networkView AnswerAnswer: B
Which of the following is a common method for detecting phishing attacks in threat hunting techniques?
Which of the following is a common method for detecting phishing attacks in threat hunting techniques?A . DNS monitoringB . Predictive analyticsC . Asset managementD . Hardware encryptionView AnswerAnswer: A
Which step in the threat hunting process involves examining network traffic patterns to identify anomalies?
Which step in the threat hunting process involves examining network traffic patterns to identify anomalies?A . Data CollectionB . Log AnalysisC . Network Traffic AnalysisD . Threat CorrelationView AnswerAnswer: C
What is the primary goal of threat hunting techniques?
What is the primary goal of threat hunting techniques?A . To respond to threats after they have already occurredB . To proactively search for potential threats within an organizationC . To ignore potential threats and focus on other security measuresD . To rely solely on automated tools for threat detectionView...
What is one drawback of relying solely on technical indicators for threat actor attribution?
What is one drawback of relying solely on technical indicators for threat actor attribution?A . Overestimating the capabilities of the threat actorB . Underestimating the sophistication of the threat actorC . Failing to consider human behavior and tacticsD . Ignoring the motivation behind the attackView AnswerAnswer: C
Which threat hunting technique focuses on analyzing network traffic to detect and prevent threats?
Which threat hunting technique focuses on analyzing network traffic to detect and prevent threats?A . Behavior-based detectionB . YARA rule matchingC . Netflow analysisD . Packet capture analysisView AnswerAnswer: C
What role does threat actor attribution play in cyber threat intelligence?
What role does threat actor attribution play in cyber threat intelligence?A . Providing context for threat alertsB . Enforcing compliance regulationsC . Enhancing network speedD . Optimizing server performanceView AnswerAnswer: A
Which of the following is NOT a common data source used in threat hunting?
Which of the following is NOT a common data source used in threat hunting?A . Network traffic logsB . Employee payroll informationC . Endpoint security logsD . DNS logsView AnswerAnswer: B