Questions

  1. At what level of the threat hunting maturity model would technologies such as machine learning be found?

A) HM0
B) HM1
C) HM2
D) HM3

  1. Which of the following is a top 10 IoC?

A) IP address
B) Malware signature
C) Excessive file request
D) URL

  1. A threat hunt initiating event can be a threat intelligence report.

A) True
B) False

  1. A working hypothesis is a generalized statement regarding the intent of the threat hunt.

A) True
B) False