ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 24 - SPLK-5001 discussion

Report
Export

A threat hunter executed a hunt based on the following hypothesis:

As an actor, I want to plant rundll32 for proxy execution of malicious code and leverage Cobalt Strike for Command and Control.

Relevant logs and artifacts such as Sysmon, netflow, IDS alerts, and EDR logs were searched, and the hunter is confident in the conclusion that Cobalt Strike is not present in the company's environment.

Which of the following best describes the outcome of this threat hunt?

A.
The threat hunt was successful because the hypothesis was not proven.
Answers
A.
The threat hunt was successful because the hypothesis was not proven.
B.
The threat hunt failed because the hypothesis was not proven.
Answers
B.
The threat hunt failed because the hypothesis was not proven.
C.
The threat hunt failed because no malicious activity was identified.
Answers
C.
The threat hunt failed because no malicious activity was identified.
D.
The threat hunt was successful in providing strong evidence that the tactic and tool is not present in the environment.
Answers
D.
The threat hunt was successful in providing strong evidence that the tactic and tool is not present in the environment.
Suggested answer: D
asked 23/09/2024
Nelson G Porras
42 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first