- At what level of the threat hunting maturity model would technologies such as machine learning be found?
A) HM0
B) HM1
C) HM2
D) HM3
- Which of the following is a top 10 IoC?
A) IP address
B) Malware signature
C) Excessive file request
D) URL
- A threat hunt initiating event can be a threat intelligence report.
A) True
B) False
- A working hypothesis is a generalized statement regarding the intent of the threat hunt.
A) True
B) False