Questions
Answer the following questions to test your knowledge of this chapter:
- At what level of the threat hunting maturity model would technologies such as machine learning be found?
- HM0
- HM1
- HM2
- HM3
- Which of the following is a top 10 IOC?
- IP address
- Malware signature
- Excessive file request
- URL
- A threat hunt-initiating event can be a threat intelligence report.
- True
- False
- A working hypothesis is a generalized statement regarding the intent of the threat hunt.
- True
- False