Online Courses
Cyber Threat Hunting
Online Courses
Cyber Threat Hunting
  • Cyber Threat Hunting
  • Introduction
    • What is cyber threat hunting?
    • Implementation considerations
    • Threat hunting models
    • Benefits of threat hunting
  • Threat Hunting Artifacts and Types
    • Artifacts and types
    • IOCs and IOAs
    • Indicators of compromise
    • Tactics, techniques and procedures (TTPs)
  • Threat hunting techniques and generative AI
    • Aggregation of data sources
    • Anomalies and baselining
      • Baselining
      • Searching
      • Grouping and clustering with AI
  • Threat hunting methodologies
    • Introduction
    • Structured hunting (MITRE)
    • Unstructured hunting
    • Entity driven hunting
  • Threat hunting data and technologies
    • Data and technologies
    • Network data
    • Endpoint data
    • Security information and event management (SIEM)
    • Threat intelligence platforms
    • Ticketing/SOAR
  • Cyber threat hunting process
    • Introduction
    • Scoping and hypothesis development
    • Formulate
    • Execution
    • Cyber threat hunting: Lessons learned
  • Cyber threat hunting scenarios
    • Structured hunt scenario
    • Unstructured hunt scenario
    • Entity-driven hunt scenario
    • Situation-driven hunt scenario
  • Hunting for network-based threats
    • Network Threats
    • DNS abnormalities
    • Hunting for DDoS activity
    • Hunting for suspicious domains
    • Hunting for irregular traffic
  • Hunting for host-based threats
    • Host-based threats
    • Malware
    • Hunting for irregular processes
    • Process hierarchy
    • Detecting lateral movement
    • Hunting for malicious files
    • Database swells
  • Quiz
Powered by GitBook
On this page
  • Question 1
  • Question 2
  • Question 3
  • Question 4
  • Question 5
  • Question 6
  • Question 7
  • Question 8
  • Question 9
  • Question 10
  • Question 12
  • Question 13
  • Question 14
  • Question 15
  • Question 16
  • Question 17
  • Question 18
  • Question 19
  • Question 20
  • Question 21

Quiz

Question 1

What are some effective methods of remediating a cyber threat?

Solution
  • Training staff on cybersecurity best practices

  • Updating security policies

  • Patching the system to fix vulnerabilities

Question 2

What is the primary purpose of Attack Simulation in cyber threat hunting?

Solution

To test the effectiveness of the existing security controls

Question 3

Which of the following actions are part of the remediation process after a cyber threat has been identified?

Solution
  • Reviewing and analyzing the incident

  • Updating firewall rules

  • Implementing security patches

Question 4

Which of the following technologies can be used in threat hunting?

Solution
  • Security Information and Event Management (SIEM)

  • Intrusion Detection System (IDS)

  • Threat Intelligence Platforms

Question 5

Which of the following activities are included in the process of threat hunting?

Solution
  • Investigating anomalies in system logs

  • Analyzing network traffic for suspicious activity

Question 6

Which of the following is NOT a common type of threat hunting approach?

Solution

Guess-driven approach

Question 7

Which of the following is a commonly used technique for threat hunting?

Solution

Red teaming

Question 8

Which of the following is NOT a phase in the Cyber Threat Hunting methodology?

Solution

Data Destruction

Question 9

Which of the following techniques are commonly used in cyber threat hunting?

Solution
  • User behavior analytics

  • Threat intelligence

  • Machine learning

Question 10

Which of the following is an important step in the remediation process of a cyber threat?

Solution

Documenting the incident for future reference

Question 12

You've just identified a new potential cyber threat. What's the first step in the threat hunting process?

Solution

Formulate an initial hypothesis

Question 13

What is the goal of threat hunting? Please answer in all lowercase.

Solution

The aim of threat hunting is to proactively identify, detect, or uncover threats that may not have been detected by automated security solutions.

Question 14

What does the term 'threat hunting' refer to in the context of cyber security?

Solution

The process of actively looking for threats before they can cause harm

Question 15

Select the types of threat hunting artifacts that are commonly used in cyber threat hunting.

Solution
  • Network traffic logs

  • Email server logs

  • Web server logs

Question 16

Which of the following can be used to enhance threat hunting capabilities?

Solution
  • Regularly updating and patching systems

  • Using generative AI to simulate potential threats

  • Training staff on the latest threat trends

Question 17

Select the factors that can influence the creation of an effective hypothesis in Cyber Threat Hunting.

Solution
  • Familiarity with the latest cyber security threats

  • Understanding of the threat landscape

  • Understanding of the organization's business processes

  • Knowledge about the organization's IT infrastructure

Question 18

What is the primary goal of cyber threat hunting?

Solution

To proactively search for cyber threats

Question 19

What is a common goal of the remediation process in cyber threat hunting? Please answer in all lowercase.

Solution

preventing future attacks

Question 20

What type of data is typically used in threat hunting?

Solution

A combination of network data, log data, and user behavior data

Question 21

What is the phase in the Cyber Threat Hunting methodology where potential threats are investigated to confirm if they are real threats?

Solution

Threat Verification

PreviousDatabase swells

Last updated 9 months ago