Which of the following is an example of an active threat hunting technique?
Which of the following is an example of an active threat hunting technique?A . Monitoring inbound and outbound network trafficB . Waiting for alerts to trigger before taking actionC . Conducting regular vulnerability scans without analysisD . Relying solely on automated threat detection toolsView AnswerAnswer: A
Which factor is NOT typically considered in threat actor attribution?
Which factor is NOT typically considered in threat actor attribution?A . Geopolitical tensionsB . Linguistic skillsC . Technical capabilitiesD . Brand reputationView AnswerAnswer: D
Which of the following is NOT a commonly used technique for threat actor attribution?
Which of the following is NOT a commonly used technique for threat actor attribution?A . Threat intelligence sharingB . Social media analysisC . Data encryptionD . Behavioral analysisView AnswerAnswer: C
Which of the following is NOT a factor considered in threat actor attribution?
Which of the following is NOT a factor considered in threat actor attribution?A . MotiveB . InfrastructureC . Frequency of attacksD . AttributionView AnswerAnswer: C
What is the purpose of using attack trees in threat modeling?
What is the purpose of using attack trees in threat modeling?A . To visualize the attack surface of a systemB . To categorize different types of threatsC . To simulate potential cyber attacksD . To model the potential pathways an attacker could takeView AnswerAnswer: D
What role does correlation play in threat hunting?
What role does correlation play in threat hunting?A . It ensures that all identified threats are immediately blockedB . It connects various data points to identify potential threatsC . It blocks incoming traffic from suspicious IP addressesD . It monitors user activity but does not correlate it with any other...
When conducting threat actor attribution, what is the purpose of analyzing the motive behind an attack?
When conducting threat actor attribution, what is the purpose of analyzing the motive behind an attack?A . To identify specific vulnerabilities in the targetB . To determine the financial gain of the attackerC . To understand the attacker's goals and intentionsD . To track the spread of malwareView AnswerAnswer: C
In the context of the threat hunting process, what does the term "pivot" mean?
In the context of the threat hunting process, what does the term "pivot" mean?A . To move quickly from one hypothesis to anotherB . To backtrack and analyze previous dataC . To rotate data points in a visualizationD . To confirm a suspected threatView AnswerAnswer: A
Which threat modeling technique involves mapping out the steps an attacker would take to compromise a system?
Which threat modeling technique involves mapping out the steps an attacker would take to compromise a system?A . Kill chain analysisB . Risk assessmentC . Data flow diagramsD . Root cause analysisView AnswerAnswer: A
Which of the following is NOT a common outcome of successful threat hunting activities?
Which of the following is NOT a common outcome of successful threat hunting activities?A . Improved incident response capabilitiesB . Decreased network visibilityC . Enhanced knowledge of the threat landscapeD . Reduction in dwell time of threatsView AnswerAnswer: B