ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 61 - SPLK-5001 discussion

Report
Export

A threat hunter generates a report containing the list of users who have logged in to a particular database during the last 6 months, along with the number of times they have each authenticated. They sort this list and remove any user names who have logged in more than 6 times. The remaining names represent the users who rarely log in, as their activity is more suspicious. The hunter examines each of these rare logins in detail.

This is an example of what type of threat-hunting technique?

A.
Least Frequency of Occurrence Analysis
Answers
A.
Least Frequency of Occurrence Analysis
B.
Co-Occurrence Analysis
Answers
B.
Co-Occurrence Analysis
C.
Time Series Analysis
Answers
C.
Time Series Analysis
D.
Outlier Frequency Analysis
Answers
D.
Outlier Frequency Analysis
Suggested answer: A
asked 23/09/2024
Andrey Zhukovskiy
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first