Which of the following is NOT a common threat modeling technique?

Which of the following is NOT a common threat modeling technique?A . Attack treesB . DREAD modelC . Kill chain analysisD . SWOT analysisView AnswerAnswer: D

March 3, 2025 No Comments READ MORE +

What is the difference between threat hunting and traditional security measures like firewalls and antivirus software?

What is the difference between threat hunting and traditional security measures like firewalls and antivirus software?A . Threat hunting focuses on identifying threats that have evaded traditional security measuresB . Traditional security measures are more expensive than threat huntingC . Threat hunting uses artificial intelligence while traditional security measures do...

February 28, 2025 No Comments READ MORE +

What is the primary goal of using the STRIDE model in threat modeling?

What is the primary goal of using the STRIDE model in threat modeling?A . Identify potential attacker motivations and goalsB . Assess the impact of security vulnerabilitiesC . Identify potential threats and their characteristicsD . Ensure the security of sensitive dataView AnswerAnswer: C

February 27, 2025 No Comments READ MORE +

What is the main goal of using infrastructure analysis in threat actor attribution?

What is the main goal of using infrastructure analysis in threat actor attribution?A . To identify the physical infrastructure used by the attackerB . To track the command and control serverC . To analyze the structure and organization of the attacker's operationsD . To gather intelligence from open-source dataView AnswerAnswer:...

February 27, 2025 No Comments READ MORE +

What is a key benefit of implementing threat hunting in an organization's cybersecurity strategy?

What is a key benefit of implementing threat hunting in an organization's cybersecurity strategy?A . Reduced need for employee training on cybersecurityB . Faster response time to threats in the networkC . Increased network downtimeD . Improved employee moraleView AnswerAnswer: B

February 24, 2025 No Comments READ MORE +

Which of the following is a common data source used in threat hunting?

Which of the following is a common data source used in threat hunting?A . HR databasesB . Social media feedsC . Security logsD . Customer reviewsView AnswerAnswer: C

February 23, 2025 No Comments READ MORE +

Which of the following is a method used in threat actor attribution?

Which of the following is a method used in threat actor attribution?A . Packet sniffingB . Social engineeringC . Geolocation trackingD . Behavioral analysisView AnswerAnswer: C

February 23, 2025 No Comments READ MORE +

What role does data analysis play in threat hunting?

What role does data analysis play in threat hunting?A . Data analysis is not important in threat huntingB . Data analysis helps identify patterns and anomalies that indicate potential threatsC . Data analysis only serves to slow down the threat hunting processD . Data analysis is only used for compliance...

February 22, 2025 No Comments READ MORE +

What is the role of machine learning in threat hunting techniques?

What is the role of machine learning in threat hunting techniques?A . To replace human analysts in the threat hunting processB . To automate the entire threat detection processC . To provide intelligence and analytics for detecting threatsD . To slow down the threat detection processView AnswerAnswer: C

February 22, 2025 No Comments READ MORE +

Which of the following is a common technique used in threat hunting?

Which of the following is a common technique used in threat hunting?A . Network segmentationB . Incident responseC . Cloud computingD . Endpoint monitoringView AnswerAnswer: D

February 22, 2025 No Comments READ MORE +