Complete the sentence to identify a common threat hunting technique.
One common threat hunting technique is [1] analysis, which involves examining data for unusual patterns.
Behavioral analysis looks at how users or systems act to find threats that don't match normal patterns.
Complete the sentence to describe a key step in threat hunting.
Threat hunting often starts with a [1] hypothesis to guide the investigation.
A structured hypothesis helps hunters focus on specific threats or behaviors to investigate.
Fix the error in the sentence about threat hunting tools.
Threat hunters use [1] intelligence to enrich data and find hidden threats.
Threat intelligence provides information about known threats to help hunters detect attacks.
Fill both blanks to complete the threat hunting process steps.
First, hunters [1] data sources, then they [2] suspicious activities.
Hunters collect data from various sources and then analyze it to find suspicious activities.
Fill all three blanks to complete the threat hunting workflow.
Hunters create a [1] based on [2] data, then use [3] tools to detect threats.
Hunters form a hypothesis using collected data and apply analysis tools to find threats.