Huntingthreat 2

Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 3

===================================================================================

===================================================================================
===================================================================================
===================================================================================
===================================================================================
==================================================
=================================================================================
=================================================================================

Threat Hunting

-----------------------------------------------------------------------------------
-----------------------

A potential occurrence that might compromise your assets is known as __________.


threat

Threat hunting and threat detection are same.


false

Threat hunters use __________.


both

Which of the following threat hunting platform uses a graphical interface to


display information quickly and accurately?
Maltego

Which of the following are threat hunting techniques?


all

Which threat hunting platform applies Artificial Intelligence to detect and hunt
for cyber attacks in real time?
Vectra

Which threat hunting platform was acquired by Amazon Web Services?


Sqrrl

Which of the following is a stage in Cyber Kill Chain?


all

_____________ is used for identification and prevention of cyber intrusions.


Cyber kill chain

Which of the following is the cyber threat intelligence model that have been widely
used in the industry?
both

In the word STRIDE, R stand for _________.


Repudiation

Which of the following threat hunting platforms use machine learning and data
science to prevent and detect attacks at the early stage of the attack life cycle?
Vectra

Threat hunters should mainly focus on which of the following things?


Doubtful areas Plain credentials Slow and low connections

Which of the following is perfect for highlighting the continuous process


improvement?
Hunting matrix

The technique through which isolating groups of similar information is called


Clustering

Threat hunting maturity model was defined by ____________.


Sqrrl

Which threat hunting technique is best suitable when handling datasets that creates
limited number of results?
Stacking

Which of the following is an adaptation of the U.S. military’s kill chain process?
The Cyber Kill Chain

Who developed hunting maturity model?


David Bianco, a Sqrrl’s security technologist

Malicious executables are transmitted during which stage of cyber Kill chain?
Delivery

Which of the following are the benefits of threat hunting?


Creating new ways of finding threats Reducing the overall attack surface Reducing
investigation time

The Threat Hunting technique "Search" works by focusing too specifically and
creates the "right number of outcomes" to reach a conclusion.
true

Which of the following are the top challenges of threat hunting?


both

Organizations that try new methods to detect threats, fall under which level of
hunting maturity model?
Leading

Threat hunting should not be conducted by external service provider.


false

Which of the following level in hunting maturity model is not capable for threat
hunting?
initial

What is the full form of MDR?


Managed Detection and Response.....

In data flow diagrams (DFD), the data flow shape represents boundary between trust
levels or privileges.
true

HMM stands for ___________.


Hunting maturity model

-----------------------------------------------------------------------------------
-------------------------------------------------------
=================================================================================
=================================================================================
===================================================================================
===================================================================================
===================================================================================
===================================================================================
===================================================================================
===================================================================================
===================================================================================
============================================================================

You might also like