What is an example of a threat hunting technique?
What is an example of a threat hunting technique?A . Signature-based detectionB . Vulnerability scanningC . Indicator of compromise (IOC) analysisD . Incident responseView AnswerAnswer: C
What does the term "threat intelligence" refer to in the context of threat hunting?
What does the term "threat intelligence" refer to in the context of threat hunting?A . Real-time monitoring of network trafficB . Data collected from previous security incidentsC . Predictive analysis of potential cyber threatsD . Information about current and emerging threatsView AnswerAnswer: D
Which of the following techniques involves searching for indicators of compromise (IoC) in an organization's network?
Which of the following techniques involves searching for indicators of compromise (IoC) in an organization's network?A . NetFlow analysisB . Geolocation trackingC . Hashing algorithmsD . IoC scanningView AnswerAnswer: D
What is a common technique used in threat hunting to detect anomalies in network traffic?
What is a common technique used in threat hunting to detect anomalies in network traffic?A . Machine learning algorithmsB . Random password generationC . Manual inspection of all log filesD . Ignoring network traffic altogetherView AnswerAnswer: A
Which of the following is a network-based threat hunting technique?
Which of the following is a network-based threat hunting technique?A . Log analysisB . Port scanningC . Malware sandboxingD . Traffic analysisView AnswerAnswer: D
What is the primary goal of threat emulation in threat hunting techniques?
What is the primary goal of threat emulation in threat hunting techniques?A . To replicate attacker techniques to test defensesB . To encrypt sensitive dataC . To monitor system logs for anomaliesD . To analyze malware payloadsView AnswerAnswer: A
Which of the following is an example of an active threat hunting technique?
Which of the following is an example of an active threat hunting technique?A . Conducting regular vulnerability scansB . Reviewing security logs after an incidentC . Monitoring network traffic in real-timeD . Waiting for alerts from automated security toolsView AnswerAnswer: C
Which threat modeling technique involves identifying security controls and countermeasures to mitigate threats?
Which threat modeling technique involves identifying security controls and countermeasures to mitigate threats?A . Data flow diagramsB . Threat modeling matrixC . SWOT analysisD . STRIDE modelView AnswerAnswer: B
Which step in the threat hunting process involves creating and executing queries to search for indicators of compromise?
Which step in the threat hunting process involves creating and executing queries to search for indicators of compromise?A . Data CollectionB . Data AnalysisC . Data ProcessingD . Data EnrichmentView AnswerAnswer: B
What role does threat hunting play in achieving business objectives through improved outcomes?
What role does threat hunting play in achieving business objectives through improved outcomes?A . Deterring all cyber attacks successfullyB . Streamlining incident response processesC . Neglecting the importance of threat intelligenceD . Enabling better risk management decisionsView AnswerAnswer: D