ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 53 - SY0-701 discussion

Report
Export

A cyber operations team informs a security analyst about a new tactic malicious actors are using to compromise networks.

SIEM alerts have not yet been configured. Which of the following best describes what the security analyst should do to identify this behavior?

A.
[Digital forensics
Answers
A.
[Digital forensics
B.
E-discovery
Answers
B.
E-discovery
C.
Incident response
Answers
C.
Incident response
D.
Threat hunting
Answers
D.
Threat hunting
Suggested answer: D

Explanation:

Threat hunting is the process of proactively searching for signs of malicious activity or compromise in a network, rather than waiting for alerts or indicators of compromise (IOCs) to appear. Threat hunting can help identify new tactics, techniques, and procedures (TTPs) used by malicious actors, as well as uncover hidden or stealthy threats that may have evaded detection by security tools. Threat hunting requires a combination of skills, tools, and methodologies, such as hypothesis generation, data collection and analysis, threat intelligence, and incident response. Threat hunting can also help improve the security posture of an organization by providing feedback and recommendations for security improvements.Reference=CompTIA Security+ Certification Exam Objectives, Domain 4.1: Given a scenario, analyze potential indicators of malicious activity.CompTIA Security+ Study Guide (SY0-701), Chapter 4: Threat Detection and Response, page 153.Threat Hunting -- SY0-701 CompTIA Security+ : 4.1, Video 3:18.CompTIA Security+ Certification Exam SY0-701 Practice Test 1, Question 3.

asked 02/10/2024
bhaskar siddanadham
32 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first