Threat Hunting Teams Quiz

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is a recommended method for new practitioners joining hunt teams? A. Create extensive policies governing hunt team actions B. Reduce the needs for iteration of hunt team plans C. Only perform hunt team tasks known to produce results

A. Create extensive policies governing hunt team actions

Where should hunt team functions be located in an organization? A. They can be located in several places, but functionality should rely on internal experts B. Hunt team operations should always exist as a separate component from incident response C. External organizations should be used to perform hunting activities for most organizations D. There is regulatory guidance on location of hunt team functionality; consult

A. They can be located in several places, but functionality should rely on internal experts

What is a definite benefit to hunt team activities? A. Quicker resolution of incidents B. Discovery of potential threats before they might normally be detected C. Lower need for other organizational security resources D. More advanced methodologies for incident response

B. Discovery of potential threats before they might normally be detected

All date and time stamps follow the ISO 8601 standard for labeling. A. True B. False

B. False

Hunting teams are primarily focused on discovering and addressing vulnerabilities inside their constituency. A. True B. False

B. False

Which of the following is a potential hunting process? A. Investigate, identify suspicious activity B. Mine data, identify suspicious activity, investigate, codify a repeatable analysis process C. Observe maturity and adoption of methods, investigate D. Focus on network-based detection of malicious activity, investigate

B. Mine data, identify suspicious activity, investigate, codify a repeatable analysis process

Which of the following is NOT used to determine if an incident should be designated as a particular priority? A. Criticality of systems involved B. Sophistication of malicious activity C. Cost of solution D. Impact or damage to organization

C. Cost of solution

Which of the following is NOT a purpose of threat modeling? A. Prioritizing which threats to handle first B. Organizing threats to an organization in a standardized manner C. Creating new vulnerability discovery techniques D. Using output to inform risk assessments

C. Creating new vulnerability discovery techniques

What does IOC stand for in the context of incident handling critical information? A. Index Output Categories B. Index of Categories C. Indicators of Compromise D. Indicators of Categories

C. Indicators of Compromise

Which of the following is an example of attack targets that might be reported in an incident report? A. Types and numbers of systems B. IP ranges C. Types of institutions D. Types of employees E. None of the above F. All of the above

F. All of the above

What are some typical sources of information used by hunting teams? A. Vendor trend reports B. New vulnerability disclosures C. Organizational disciplinary records D. Organizational budgetary information

Vendor trend reports


संबंधित स्टडी सेट्स

BEING A GOOD STEWARD OF GOD'S CREATION

View Set

COMP-2450 Data Structures Final (All test questions)

View Set

Parts of Speech - Nouns: Singular and Plural

View Set

Chapter 19: Documenting and Reporting

View Set

Chapter 10 Food Safety Management Set

View Set

AP Psychology - Unit 2 Progress Check MCQ

View Set

CSC 415 Operating System Principles Chapter 1

View Set

Ch.21 Statistical Process Control

View Set