Which threat modeling technique involves identifying potential threats by thinking like an attacker?
Which threat modeling technique involves identifying potential threats by thinking like an attacker?A . DREAD modelB . Attack surface analysisC . STRIDE modelD . Penetration testingView AnswerAnswer: D
Which threat hunting technique involves analyzing system logs for unusual or suspicious activity?
Which threat hunting technique involves analyzing system logs for unusual or suspicious activity?A . Payload analysisB . Behavioral analyticsC . Log analysisD . Threat emulationView AnswerAnswer: C
In the context of the threat hunting process, what is an indicator of compromise (IOC)?
In the context of the threat hunting process, what is an indicator of compromise (IOC)?A . Weaknesses in network defensesB . Anomalies in system behaviorC . Known malware signaturesD . Threat intelligence reportsView AnswerAnswer: C
In threat modeling, what does the "DREAD" model stand for?
In threat modeling, what does the "DREAD" model stand for?A . Detect, Response, Eliminate, Analyze, DeterrentB . Damage potential, Reproducibility, Exploitability, Affected users, DiscoverabilityC . Defense, Resilience, Evasion, Attack, DenialD . Data loss, Resource exhaustion, Access control, Denial of service, DisclosureView AnswerAnswer: B
During which phase of the threat hunting process are threat indicators analyzed and correlated?
During which phase of the threat hunting process are threat indicators analyzed and correlated?A . CollectionB . AnalysisC . InvestigationD . RemediationView AnswerAnswer: B
What does the term "honeypot" refer to in threat hunting techniques?
What does the term "honeypot" refer to in threat hunting techniques?A . A sweet treat for security analystsB . A decoy system designed to lure attackersC . A type of encryption algorithmD . A tool used for network mappingView AnswerAnswer: B
What is the purpose of the data processing phase in the threat hunting process?
What is the purpose of the data processing phase in the threat hunting process?A . To prioritize threats based on severityB . To enrich collected data with threat intelligenceC . To filter and normalize data for analysisD . To block malicious traffic at the perimeterView AnswerAnswer: C
What is the purpose of proactively conducting threat hunting in a cybersecurity environment?
What is the purpose of proactively conducting threat hunting in a cybersecurity environment?A . To detect and neutralize threats that have bypassed traditional security measures.B . To respond to security incidents after they have already occurred.C . To install new antivirus software on all devices.D . To generate automated cybersecurity...
How can threat hunting benefit from leveraging threat intelligence feeds?
How can threat hunting benefit from leveraging threat intelligence feeds?A . By reducing the need for regular monitoringB . By providing up-to-date information on emerging threatsC . By automating the threat hunting process entirelyD . By limiting the scope of investigations to known indicatorsView AnswerAnswer: B
What is the primary goal of threat modeling in cybersecurity?
What is the primary goal of threat modeling in cybersecurity?A . Identifying vulnerabilitiesB . Conducting penetration testingC . Developing incident response plansD . Prioritizing security controlsView AnswerAnswer: A