0
0
Cybersecurityknowledge~20 mins

Threat hunting techniques in Cybersecurity - Practice Problems & Coding Challenges

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
Threat Hunting Mastery
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate
2:00remaining
Understanding Threat Hunting Hypotheses

Which of the following best describes the role of a hypothesis in threat hunting?

AA guess made without any data to start the investigation
BA final conclusion after completing the threat hunt
CA testable statement based on observed data to guide the hunt
DA list of all known malware signatures used in detection
Attempts:
2 left
💡 Hint

Think about how hunters decide what to look for before searching.

📋 Factual
intermediate
2:00remaining
Common Data Sources in Threat Hunting

Which data source is most commonly used for detecting lateral movement within a network during threat hunting?

AEndpoint process execution logs
BDNS query logs
CFirewall traffic logs
DEmail spam filters
Attempts:
2 left
💡 Hint

Consider where you can see what programs are running on computers.

🔍 Analysis
advanced
2:00remaining
Analyzing Threat Hunting Techniques

Which technique is best suited for discovering unknown threats that do not match existing signatures?

AAnomaly detection using baselines
BSignature-based detection
CUsing antivirus software scans
DBlocking known malicious IP addresses
Attempts:
2 left
💡 Hint

Think about how to find threats that look different from normal behavior.

Comparison
advanced
2:00remaining
Comparing Threat Hunting Approaches

Which statement correctly compares proactive and reactive threat hunting?

AProactive hunting waits for alerts before investigating; reactive hunting searches without alerts.
BReactive hunting ignores alerts and focuses on random data analysis.
CBoth proactive and reactive hunting only respond after a breach is confirmed.
DProactive hunting uses hypotheses to search for threats before alerts; reactive hunting investigates after alerts.
Attempts:
2 left
💡 Hint

Consider when each hunting approach starts the investigation.

Reasoning
expert
2:00remaining
Evaluating Threat Hunting Outcomes

After conducting a threat hunt, a team finds no evidence of compromise but notices unusual spikes in network traffic at odd hours. What is the best next step?

AIgnore the spikes as false positives since no compromise was found.
BInvestigate the unusual traffic further to understand its cause.
CConclude the environment is safe and end the hunt immediately.
DDelete all logs to prevent confusion in future hunts.
Attempts:
2 left
💡 Hint

Think about how to handle suspicious but unclear findings.