Bird
0
0

Which of the following is a common technique used in threat hunting?

easy📝 Factual Q12 of 15
Cybersecurity - Advanced Threat Protection
Which of the following is a common technique used in threat hunting?
AIgnoring network logs
BWaiting for alerts from antivirus software
CForming hypotheses about attacker behavior
DDisabling firewalls to reduce false alarms
Step-by-Step Solution
Solution:
  1. Step 1: Identify common threat hunting methods

    Threat hunting often starts with forming hypotheses about how attackers might behave.
  2. Step 2: Evaluate each option

    Waiting for alerts is reactive, ignoring logs or disabling firewalls harms security, so only forming hypotheses fits.
  3. Final Answer:

    Forming hypotheses about attacker behavior -> Option C
  4. Quick Check:

    Hypothesis formation = key hunting step [OK]
Quick Trick: Threat hunting starts with guessing attacker actions [OK]
Common Mistakes:
MISTAKES
  • Thinking threat hunting is passive waiting
  • Ignoring important data sources like logs
  • Reducing security tools to avoid alerts

Want More Practice?

15+ quiz questions · All difficulty levels · Free

Free Signup - Practice All Questions
More Cybersecurity Quizzes