Which of the following is an example of an active threat hunting technique?

Which of the following is an example of an active threat hunting technique?A . Monitoring inbound and outbound network trafficB . Waiting for alerts to trigger before taking actionC . Conducting regular vulnerability scans without analysisD . Relying solely on automated threat detection toolsView AnswerAnswer: A

May 4, 2025 No Comments READ MORE +

Which factor is NOT typically considered in threat actor attribution?

Which factor is NOT typically considered in threat actor attribution?A . Geopolitical tensionsB . Linguistic skillsC . Technical capabilitiesD . Brand reputationView AnswerAnswer: D

May 4, 2025 No Comments READ MORE +

Which of the following is NOT a commonly used technique for threat actor attribution?

Which of the following is NOT a commonly used technique for threat actor attribution?A . Threat intelligence sharingB . Social media analysisC . Data encryptionD . Behavioral analysisView AnswerAnswer: C

May 2, 2025 No Comments READ MORE +

Which of the following is NOT a factor considered in threat actor attribution?

Which of the following is NOT a factor considered in threat actor attribution?A . MotiveB . InfrastructureC . Frequency of attacksD . AttributionView AnswerAnswer: C

May 2, 2025 No Comments READ MORE +

What is the purpose of using attack trees in threat modeling?

What is the purpose of using attack trees in threat modeling?A . To visualize the attack surface of a systemB . To categorize different types of threatsC . To simulate potential cyber attacksD . To model the potential pathways an attacker could takeView AnswerAnswer: D

April 29, 2025 No Comments READ MORE +

What role does correlation play in threat hunting?

What role does correlation play in threat hunting?A . It ensures that all identified threats are immediately blockedB . It connects various data points to identify potential threatsC . It blocks incoming traffic from suspicious IP addressesD . It monitors user activity but does not correlate it with any other...

April 29, 2025 No Comments READ MORE +

When conducting threat actor attribution, what is the purpose of analyzing the motive behind an attack?

When conducting threat actor attribution, what is the purpose of analyzing the motive behind an attack?A . To identify specific vulnerabilities in the targetB . To determine the financial gain of the attackerC . To understand the attacker's goals and intentionsD . To track the spread of malwareView AnswerAnswer: C

April 29, 2025 No Comments READ MORE +

In the context of the threat hunting process, what does the term "pivot" mean?

In the context of the threat hunting process, what does the term "pivot" mean?A . To move quickly from one hypothesis to anotherB . To backtrack and analyze previous dataC . To rotate data points in a visualizationD . To confirm a suspected threatView AnswerAnswer: A

April 28, 2025 No Comments READ MORE +

Which threat modeling technique involves mapping out the steps an attacker would take to compromise a system?

Which threat modeling technique involves mapping out the steps an attacker would take to compromise a system?A . Kill chain analysisB . Risk assessmentC . Data flow diagramsD . Root cause analysisView AnswerAnswer: A

April 28, 2025 No Comments READ MORE +

Which of the following is NOT a common outcome of successful threat hunting activities?

Which of the following is NOT a common outcome of successful threat hunting activities?A . Improved incident response capabilitiesB . Decreased network visibilityC . Enhanced knowledge of the threat landscapeD . Reduction in dwell time of threatsView AnswerAnswer: B

April 27, 2025 No Comments READ MORE +