Which threat framework allows a threat hunter to explore and model specific adversary tactics and techniques, with links to intelligence and case studies?
Answer : A
In the MITRE ATT&CK Framework (version 11 - the newest version released in April 2022), which of the following pair of tactics is not in the Enterprise: Windows matrix?
Answer : B
In which of the following stages of the Cyber Kill Chain does the actor not interact with the victim endpoint(s)?
Answer : B
What information is provided from the MITRE ATT&CK framework in a detection's Execution Details?
Answer : C
You need details about key data fields and sensor events which you may expect to find from Hosts running the Falcon sensor. Which documentation should you access?
Answer : A
The Events Data Dictionary found in the Falcon documentation is useful for writing hunting queries because:
Answer : C
Which Falcon documentation guide should you reference to hunt for anomalies related to scheduled tasks and other Windows related artifacts?
Answer : A
What topics are presented in the Hunting and Investigation Guide?
Answer : C
Which of the following does the Hunting and Investigation Guide contain?
Answer : C
Which document provides information on best practices for writing Splunk-based hunting queries, predefined queries which may be customized to hunt for suspicious network connections, and predefined queries which may be customized to hunt for suspicious processes?
Answer : B
What is the main purpose of the Mac Sensor report?
Answer : B
Where would an analyst find information about shells spawned by root, Kernel Module loads, and wget/curl usage?
Answer : B
Which of the following best describes the purpose of the Mac Sensor report?
Answer : B
In the Powershell Hunt report, what does the “score” signify?
Answer : C
In the Powershell Hunt report, what does the filtering condition of CommandLine!="*badstring*" do?
Answer : A
Have any questions or issues ? Please dont hesitate to contact us