What is the purpose of setting up baselines in threat hunting?

What is the purpose of setting up baselines in threat hunting?A . To lock down access to critical systemsB . To establish a point of reference for normal network activityC . To ignore any suspicious behavior detectedD . To only focus on external threatsView AnswerAnswer: B

March 26, 2025 No Comments READ MORE +

How does threat hunting contribute to improving a company's cybersecurity posture?

How does threat hunting contribute to improving a company's cybersecurity posture?A . By eliminating all security vulnerabilities in the networkB . By providing a proactive approach to threat detection and responseC . By blocking all network traffic to prevent threatsD . By increasing employee productivityView AnswerAnswer: B

March 26, 2025 No Comments READ MORE +

What is the goal of lateral movement analysis in threat hunting techniques?

What is the goal of lateral movement analysis in threat hunting techniques?A . To identify malicious payloads in the networkB . To trace the path of an attacker within the networkC . To analyze network traffic patternsD . To detect vulnerabilities in the systemView AnswerAnswer: B

March 25, 2025 No Comments READ MORE +

During the investigation phase of the threat hunting process, what activity is typically conducted?

During the investigation phase of the threat hunting process, what activity is typically conducted?A . Refining hypothesesB . Collecting additional dataC . Generating threat intelligence reportsD . Mitigating the threatView AnswerAnswer: A

March 17, 2025 No Comments READ MORE +

What is the main goal of threat actor attribution techniques in cybersecurity?

What is the main goal of threat actor attribution techniques in cybersecurity?A . Identifying vulnerabilitiesB . Tracing attacks back to the sourceC . Creating secure passwordsD . Implementing firewallsView AnswerAnswer: B

March 17, 2025 No Comments READ MORE +

Which of the following statements best describes the concept of threat hunting in cybersecurity?

Which of the following statements best describes the concept of threat hunting in cybersecurity?A . Threat hunting aims to prevent all cyber attacks from happeningB . Threat hunting is a reactive method used to respond to threats after they have occurredC . Threat hunting involves actively searching for potential threats...

March 15, 2025 No Comments READ MORE +

Which threat modeling technique involves identifying potential threats by thinking like an attacker?

Which threat modeling technique involves identifying potential threats by thinking like an attacker?A . DREAD modelB . Attack surface analysisC . STRIDE modelD . Penetration testingView AnswerAnswer: D

March 15, 2025 No Comments READ MORE +

Which threat hunting technique involves analyzing system logs for unusual or suspicious activity?

Which threat hunting technique involves analyzing system logs for unusual or suspicious activity?A . Payload analysisB . Behavioral analyticsC . Log analysisD . Threat emulationView AnswerAnswer: C

March 14, 2025 No Comments READ MORE +

In the context of the threat hunting process, what is an indicator of compromise (IOC)?

In the context of the threat hunting process, what is an indicator of compromise (IOC)?A . Weaknesses in network defensesB . Anomalies in system behaviorC . Known malware signaturesD . Threat intelligence reportsView AnswerAnswer: C

March 13, 2025 No Comments READ MORE +

In threat modeling, what does the "DREAD" model stand for?

In threat modeling, what does the "DREAD" model stand for?A . Detect, Response, Eliminate, Analyze, DeterrentB . Damage potential, Reproducibility, Exploitability, Affected users, DiscoverabilityC . Defense, Resilience, Evasion, Attack, DenialD . Data loss, Resource exhaustion, Access control, Denial of service, DisclosureView AnswerAnswer: B

March 12, 2025 No Comments READ MORE +