Huntingthreat 2
Huntingthreat 2
Huntingthreat 2
===================================================================================
===================================================================================
===================================================================================
===================================================================================
==================================================
=================================================================================
=================================================================================
Threat Hunting
-----------------------------------------------------------------------------------
-----------------------
Which threat hunting platform applies Artificial Intelligence to detect and hunt
for cyber attacks in real time?
Vectra
Which of the following is the cyber threat intelligence model that have been widely
used in the industry?
both
Which of the following threat hunting platforms use machine learning and data
science to prevent and detect attacks at the early stage of the attack life cycle?
Vectra
Which threat hunting technique is best suitable when handling datasets that creates
limited number of results?
Stacking
Which of the following is an adaptation of the U.S. military’s kill chain process?
The Cyber Kill Chain
Malicious executables are transmitted during which stage of cyber Kill chain?
Delivery
The Threat Hunting technique "Search" works by focusing too specifically and
creates the "right number of outcomes" to reach a conclusion.
true
Organizations that try new methods to detect threats, fall under which level of
hunting maturity model?
Leading
Which of the following level in hunting maturity model is not capable for threat
hunting?
initial
In data flow diagrams (DFD), the data flow shape represents boundary between trust
levels or privileges.
true
-----------------------------------------------------------------------------------
-------------------------------------------------------
=================================================================================
=================================================================================
===================================================================================
===================================================================================
===================================================================================
===================================================================================
===================================================================================
===================================================================================
===================================================================================
============================================================================