ExamGecko
Question list
Search
Search

Related questions











Question 227 - 200-201 discussion

Report
Export

What is threat hunting?

A.

Managing a vulnerability assessment report to mitigate potential threats.

Answers
A.

Managing a vulnerability assessment report to mitigate potential threats.

B.

Focusing on proactively detecting possible signs of intrusion and compromise.

Answers
B.

Focusing on proactively detecting possible signs of intrusion and compromise.

C.

Pursuing competitors and adversaries to infiltrate their system to acquire intelligence data.

Answers
C.

Pursuing competitors and adversaries to infiltrate their system to acquire intelligence data.

D.

Attempting to deliberately disrupt servers by altering their availability

Answers
D.

Attempting to deliberately disrupt servers by altering their availability

Suggested answer: B

Explanation:

Threat hunting is a proactive cybersecurity technique that involves searching for indicators of compromise or signs of intrusion within an organization's network or systems. Unlike automated detection systems, threat hunting is typically carried out by security analysts who use their knowledge and intuition to identify subtle, unusual patterns that may indicate a security breach. The goal of threat hunting is to identify and mitigate threats before they can cause significant damage.

asked 07/10/2024
Tatiana Castillo
29 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first