Bird
0
0

You want to improve threat hunting by combining multiple data sources. Which approach best helps find hidden threats?

hard🚀 Application Q15 of 15
Cybersecurity - Advanced Threat Protection
You want to improve threat hunting by combining multiple data sources. Which approach best helps find hidden threats?
AUse only firewall logs to reduce data volume
BForm hypotheses and analyze data from network, endpoint, and user activity logs
CIgnore user activity logs because they are noisy
DRely solely on automated alerts without manual analysis
Step-by-Step Solution
Solution:
  1. Step 1: Understand the benefit of multiple data sources

    Using diverse data like network, endpoint, and user logs gives a fuller picture of threats.
  2. Step 2: Evaluate approaches for effective threat hunting

    Forming hypotheses and analyzing multiple sources is proactive and thorough, unlike ignoring data or relying only on alerts.
  3. Final Answer:

    Form hypotheses and analyze data from network, endpoint, and user activity logs -> Option B
  4. Quick Check:

    Multiple data sources + hypotheses = better hunting [OK]
Quick Trick: Combine data sources and hypotheses for best results [OK]
Common Mistakes:
MISTAKES
  • Using only one data source limits threat visibility
  • Ignoring noisy data that can hold clues
  • Relying only on automated alerts misses hidden threats

Want More Practice?

15+ quiz questions · All difficulty levels · Free

Free Signup - Practice All Questions
More Cybersecurity Quizzes