List of questions
Related questions
Question 24 - SPLK-5001 discussion
A threat hunter executed a hunt based on the following hypothesis:
As an actor, I want to plant rundll32 for proxy execution of malicious code and leverage Cobalt Strike for Command and Control.
Relevant logs and artifacts such as Sysmon, netflow, IDS alerts, and EDR logs were searched, and the hunter is confident in the conclusion that Cobalt Strike is not present in the company's environment.
Which of the following best describes the outcome of this threat hunt?
A.
The threat hunt was successful because the hypothesis was not proven.
B.
The threat hunt failed because the hypothesis was not proven.
C.
The threat hunt failed because no malicious activity was identified.
D.
The threat hunt was successful in providing strong evidence that the tactic and tool is not present in the environment.
Your answer:
0 comments
Sorted by
Leave a comment first