What is the purpose of setting up baselines in threat hunting?
What is the purpose of setting up baselines in threat hunting?A . To lock down access to critical systemsB . To establish a point of reference for normal network activityC . To ignore any suspicious behavior detectedD . To only focus on external threatsView AnswerAnswer: B
How does threat hunting contribute to improving a company's cybersecurity posture?
How does threat hunting contribute to improving a company's cybersecurity posture?A . By eliminating all security vulnerabilities in the networkB . By providing a proactive approach to threat detection and responseC . By blocking all network traffic to prevent threatsD . By increasing employee productivityView AnswerAnswer: B
What is the goal of lateral movement analysis in threat hunting techniques?
What is the goal of lateral movement analysis in threat hunting techniques?A . To identify malicious payloads in the networkB . To trace the path of an attacker within the networkC . To analyze network traffic patternsD . To detect vulnerabilities in the systemView AnswerAnswer: B
During the investigation phase of the threat hunting process, what activity is typically conducted?
During the investigation phase of the threat hunting process, what activity is typically conducted?A . Refining hypothesesB . Collecting additional dataC . Generating threat intelligence reportsD . Mitigating the threatView AnswerAnswer: A
What is the main goal of threat actor attribution techniques in cybersecurity?
What is the main goal of threat actor attribution techniques in cybersecurity?A . Identifying vulnerabilitiesB . Tracing attacks back to the sourceC . Creating secure passwordsD . Implementing firewallsView AnswerAnswer: B
Which of the following statements best describes the concept of threat hunting in cybersecurity?
Which of the following statements best describes the concept of threat hunting in cybersecurity?A . Threat hunting aims to prevent all cyber attacks from happeningB . Threat hunting is a reactive method used to respond to threats after they have occurredC . Threat hunting involves actively searching for potential threats...
Which threat modeling technique involves identifying potential threats by thinking like an attacker?
Which threat modeling technique involves identifying potential threats by thinking like an attacker?A . DREAD modelB . Attack surface analysisC . STRIDE modelD . Penetration testingView AnswerAnswer: D
Which threat hunting technique involves analyzing system logs for unusual or suspicious activity?
Which threat hunting technique involves analyzing system logs for unusual or suspicious activity?A . Payload analysisB . Behavioral analyticsC . Log analysisD . Threat emulationView AnswerAnswer: C
In the context of the threat hunting process, what is an indicator of compromise (IOC)?
In the context of the threat hunting process, what is an indicator of compromise (IOC)?A . Weaknesses in network defensesB . Anomalies in system behaviorC . Known malware signaturesD . Threat intelligence reportsView AnswerAnswer: C
In threat modeling, what does the "DREAD" model stand for?
In threat modeling, what does the "DREAD" model stand for?A . Detect, Response, Eliminate, Analyze, DeterrentB . Damage potential, Reproducibility, Exploitability, Affected users, DiscoverabilityC . Defense, Resilience, Evasion, Attack, DenialD . Data loss, Resource exhaustion, Access control, Denial of service, DisclosureView AnswerAnswer: B