Login
Remember
Register
User Robindeniel
Wall
Recent activity
All questions
All answers
Ask a Question
Answers by Robindeniel
0
votes
Which of the following is the cyber threat intelligence model that have been widely used in the industry?
answered
Apr 30, 2020
in
Internet of Things IoT
#threat-intelligence
0
votes
In the word STRIDE, R stand for _________.
answered
Apr 30, 2020
in
Internet of Things IoT
#threat-stride
#stride
0
votes
The major difference between HMM3 and HMM4 is ____________.
answered
Apr 30, 2020
in
Internet of Things IoT
#threat-automation
#threat-hmm4
0
votes
An organization should focus mainly on ___________.
answered
Apr 30, 2020
in
Internet of Things IoT
#organization-threat
0
votes
Is cyber threat hunting a realistic practice with the IOT?
answered
Apr 30, 2020
in
Internet of Things IoT
#threat-hunting
#threat-realistic
#threat-iot
0
votes
Which of the following are the top challenges of threat hunting?
answered
Apr 30, 2020
in
Internet of Things IoT
#threat-hunting
#threat-challenges
0
votes
Which of the following are the benefits of threat hunting?
answered
Apr 30, 2020
in
Internet of Things IoT
#threat-hunting-benefit
#threat-benefit
0
votes
Which of the following level in hunting maturity model is not capable for threat hunting?
answered
Apr 30, 2020
in
Internet of Things IoT
#hunting-maturity
0
votes
Threat Hunting is Proactive Approach.
answered
Apr 30, 2020
in
Internet of Things IoT
#threat-proactive-approach
0
votes
Which threat hunting technique is best suitable when handling datasets that creates limited number of results?
answered
Apr 30, 2020
in
Internet of Things IoT
#hunting-techniques
0
votes
The technique through which isolating groups of similar information is called
answered
Apr 30, 2020
in
Internet of Things IoT
#threat-clustering
0
votes
In data flow diagrams (DFD), the data flow shape represents boundary between trust levels or privileges.
answered
Apr 30, 2020
in
Internet of Things IoT
#threat-data-flow-diagram
0
votes
Which of the following are the tools required for an organization to conduct Threat Hunting?
answered
Apr 30, 2020
in
Internet of Things IoT
#threat-hunting-tools
0
votes
_________ is the first step in discovering adversaries.
answered
Apr 30, 2020
in
Internet of Things IoT
#threat-adversaries
0
votes
Which of the following is an adaptation of the U.S. military’s kill chain process?
answered
Apr 30, 2020
in
Internet of Things IoT
#cyber-kill-chain
0
votes
Malicious executables are transmitted during which stage of cyber Kill chain?
answered
Apr 30, 2020
in
Internet of Things IoT
#malicious-executables
0
votes
Maltego is an advanced querying tool that uses stateful session data models to complement user behavior analytics.
answered
Apr 30, 2020
in
Internet of Things IoT
#threa-sessions
0
votes
Which of the following threat hunting platform uses Forensic state analysis (FSA) to discover hidden threats and compromises?
answered
Apr 30, 2020
in
Internet of Things IoT
#hunting-platform
0
votes
The threats that become successful in hunting and occurs frequently are automated. This occurs in which level of hunting maturity model?
answered
Apr 30, 2020
in
Internet of Things IoT
#threat-hunting-frequency
0
votes
Who developed hunting maturity model?
answered
Apr 30, 2020
in
Internet of Things IoT
#threat-technology
Page:
« prev
1
...
159
160
161
162
163
164
165
166
167
168
169
...
199
next »
...