Which threat modeling technique involves identifying potential threats by thinking like an attacker?

Which threat modeling technique involves identifying potential threats by thinking like an attacker?A . DREAD modelB . Attack surface analysisC . STRIDE modelD . Penetration testingView AnswerAnswer: D

March 15, 2025 No Comments READ MORE +

Which threat hunting technique involves analyzing system logs for unusual or suspicious activity?

Which threat hunting technique involves analyzing system logs for unusual or suspicious activity?A . Payload analysisB . Behavioral analyticsC . Log analysisD . Threat emulationView AnswerAnswer: C

March 14, 2025 No Comments READ MORE +

In the context of the threat hunting process, what is an indicator of compromise (IOC)?

In the context of the threat hunting process, what is an indicator of compromise (IOC)?A . Weaknesses in network defensesB . Anomalies in system behaviorC . Known malware signaturesD . Threat intelligence reportsView AnswerAnswer: C

March 13, 2025 No Comments READ MORE +

In threat modeling, what does the "DREAD" model stand for?

In threat modeling, what does the "DREAD" model stand for?A . Detect, Response, Eliminate, Analyze, DeterrentB . Damage potential, Reproducibility, Exploitability, Affected users, DiscoverabilityC . Defense, Resilience, Evasion, Attack, DenialD . Data loss, Resource exhaustion, Access control, Denial of service, DisclosureView AnswerAnswer: B

March 12, 2025 No Comments READ MORE +

During which phase of the threat hunting process are threat indicators analyzed and correlated?

During which phase of the threat hunting process are threat indicators analyzed and correlated?A . CollectionB . AnalysisC . InvestigationD . RemediationView AnswerAnswer: B

March 12, 2025 No Comments READ MORE +

What does the term "honeypot" refer to in threat hunting techniques?

What does the term "honeypot" refer to in threat hunting techniques?A . A sweet treat for security analystsB . A decoy system designed to lure attackersC . A type of encryption algorithmD . A tool used for network mappingView AnswerAnswer: B

March 9, 2025 No Comments READ MORE +

What is the purpose of the data processing phase in the threat hunting process?

What is the purpose of the data processing phase in the threat hunting process?A . To prioritize threats based on severityB . To enrich collected data with threat intelligenceC . To filter and normalize data for analysisD . To block malicious traffic at the perimeterView AnswerAnswer: C

March 7, 2025 No Comments READ MORE +

What is the purpose of proactively conducting threat hunting in a cybersecurity environment?

What is the purpose of proactively conducting threat hunting in a cybersecurity environment?A . To detect and neutralize threats that have bypassed traditional security measures.B . To respond to security incidents after they have already occurred.C . To install new antivirus software on all devices.D . To generate automated cybersecurity...

March 7, 2025 No Comments READ MORE +

How can threat hunting benefit from leveraging threat intelligence feeds?

How can threat hunting benefit from leveraging threat intelligence feeds?A . By reducing the need for regular monitoringB . By providing up-to-date information on emerging threatsC . By automating the threat hunting process entirelyD . By limiting the scope of investigations to known indicatorsView AnswerAnswer: B

March 7, 2025 No Comments READ MORE +

What is the primary goal of threat modeling in cybersecurity?

What is the primary goal of threat modeling in cybersecurity?A . Identifying vulnerabilitiesB . Conducting penetration testingC . Developing incident response plansD . Prioritizing security controlsView AnswerAnswer: A

March 3, 2025 No Comments READ MORE +