Q: 11
What type of analysis is performed when using "behavioral analysis" as a threat hunting technique?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 12
What is the primary goal of using the STRIDE model in threat modeling?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 13
What technique focuses on understanding and predicting the behavior of threat actors in order to better
anticipate their actions?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 14
During which phase of the threat hunting process would you analyze the collected data for signs of
potential threats?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 15
Which of the following is a high-level approach to threat actor attribution?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 16
What is the primary goal of threat actor attribution techniques?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 17
Which term describes the practice of actively searching for cyber threats within an environment?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 18
What is a common technique used in threat hunting to detect anomalies in network traffic?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 19
Which phase of the threat hunting process involves comparing established indicators of compromise
against network behaviors?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2