Questions

  1. At what level of the threat hunting maturity model would technologies such as machine learning be found?

A) HM0
B) HM1
C) HM2
D) HM3

  1. Which of the following is a top 10 IoC?

A) IP address
B) Malware signature
C) Excessive file request
D) URL

  1. A threat hunt initiating event can be a threat intelligence report.

A) True
B) False

  1. A working hypothesis is a generalized statement regarding the intent of the threat hunt.

A) True
B) False

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.221.53.5