Bird
0
0

You want to detect lateral movement in a network using threat hunting. Which combination of techniques is best?

hard🚀 Application Q8 of 15
Cybersecurity - Advanced Threat Protection
You want to detect lateral movement in a network using threat hunting. Which combination of techniques is best?
AAnalyze unusual authentication events and monitor remote process execution
BScan for open Wi-Fi networks and update antivirus
CCheck user password strength and disable USB ports
DBackup files daily and install firewalls
Step-by-Step Solution
Solution:
  1. Step 1: Understand lateral movement indicators

    Lateral movement often involves unusual logins and remote command executions.
  2. Step 2: Match techniques to indicators

    Analyzing authentication and remote processes directly targets lateral movement detection.
  3. Final Answer:

    Analyze unusual authentication events and monitor remote process execution -> Option A
  4. Quick Check:

    Lateral movement = auth + remote process monitoring [OK]
Quick Trick: Focus on logins and remote commands to spot lateral moves [OK]
Common Mistakes:
MISTAKES
  • Confusing network scanning with lateral movement detection
  • Mixing unrelated security tasks
  • Ignoring remote process monitoring

Want More Practice?

15+ quiz questions · All difficulty levels · Free

Free Signup - Practice All Questions
More Cybersecurity Quizzes