Cybersecurity Threat Hunting Techniques
1 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

An organization's hunt team thinks a persistent threats exists and already has a foothold in the enterprise network. Which of the following techniques would be BEST for the hunt team to use to entice the adversary to uncover malicious activity?

  • Deploy a SOAR tool.
  • Modify user password history and length requirements.
  • Apply new isolation and segmentation schemes.
  • Implement decoy files on adjacent hosts. (correct)
  • More Like This

    Use Quizgecko on...
    Browser
    Browser