Login
Remember
Register
User SakshiSharma
Wall
Recent activity
All questions
All answers
Ask a Question
Questions by SakshiSharma
0
votes
1
answer
Which of the following is an adaptation of the U.S. military’s kill chain process?
asked
Apr 28, 2020
in
Internet of Things IoT
#cyber-kill-chain
0
votes
1
answer
_________ is the first step in discovering adversaries.
asked
Apr 28, 2020
in
Internet of Things IoT
#threat-adversaries
0
votes
1
answer
Which of the following are the tools required for an organization to conduct Threat Hunting?
asked
Apr 28, 2020
in
Internet of Things IoT
#threat-hunting-tools
0
votes
1
answer
In data flow diagrams (DFD), the data flow shape represents boundary between trust levels or privileges.
asked
Apr 28, 2020
in
Internet of Things IoT
#threat-data-flow-diagram
0
votes
1
answer
The technique through which isolating groups of similar information is called
asked
Apr 28, 2020
in
Internet of Things IoT
#threat-clustering
0
votes
1
answer
Which threat hunting technique is best suitable when handling datasets that creates limited number of results?
asked
Apr 28, 2020
in
Internet of Things IoT
#hunting-techniques
0
votes
1
answer
Threat Hunting is Proactive Approach.
asked
Apr 28, 2020
in
Internet of Things IoT
#threat-proactive-approach
0
votes
1
answer
Which of the following level in hunting maturity model is not capable for threat hunting?
asked
Apr 28, 2020
in
Internet of Things IoT
#hunting-maturity
0
votes
1
answer
Which of the following are the benefits of threat hunting?
asked
Apr 28, 2020
in
Internet of Things IoT
#threat-hunting-benefit
#threat-benefit
0
votes
1
answer
Which of the following are the top challenges of threat hunting?
asked
Apr 28, 2020
in
Internet of Things IoT
#threat-hunting
#threat-challenges
0
votes
1
answer
Is cyber threat hunting a realistic practice with the IOT?
asked
Apr 28, 2020
in
Internet of Things IoT
#threat-hunting
#threat-realistic
#threat-iot
0
votes
1
answer
An organization should focus mainly on ___________.
asked
Apr 28, 2020
in
Internet of Things IoT
#organization-threat
0
votes
1
answer
The major difference between HMM3 and HMM4 is ____________.
asked
Apr 28, 2020
in
Internet of Things IoT
#threat-automation
#threat-hmm4
0
votes
1
answer
In the word STRIDE, R stand for _________.
asked
Apr 28, 2020
in
Internet of Things IoT
#threat-stride
#stride
0
votes
1
answer
Which of the following is the cyber threat intelligence model that have been widely used in the industry?
asked
Apr 28, 2020
in
Internet of Things IoT
#threat-intelligence
0
votes
1
answer
In which stage of the cyber kill chain, the hunters are ready to strike?
asked
Apr 28, 2020
in
Internet of Things IoT
#cyber-kill-chain
#threat-chain
0
votes
1
answer
Which of the following is a stage in Cyber Kill Chain?
asked
Apr 28, 2020
in
Internet of Things IoT
#cyber-kill-chain
#threat-chain
0
votes
1
answer
_____________ is used for identification and prevention of cyber intrusions.
asked
Apr 28, 2020
in
Internet of Things IoT
#threat-cyber-kill-chain
0
votes
1
answer
Which threat hunting platform applies Artificial Intelligence to detect and hunt for cyber attacks in real time?
asked
Apr 28, 2020
in
Internet of Things IoT
#hunting-platform
#threat-hunting-platform
#threat-artificial-intelligence
0
votes
1
answer
Which of the following are threat hunting techniques?
asked
Apr 28, 2020
in
Internet of Things IoT
#hunting-techniques
0
votes
1
answer
Which threat hunting platform was acquired by Amazon Web Services?
asked
Apr 28, 2020
in
Internet of Things IoT
#threat-hunting-platform
#hunting-platform
0
votes
1
answer
Which of the following are threat hunting platforms?
asked
Apr 28, 2020
in
Internet of Things IoT
#threat-hunting-platform
#hunting-platform
0
votes
1
answer
Threat hunters will be able to offer a high degree of protection only if there is a _____________.
asked
Apr 28, 2020
in
Internet of Things IoT
#threat-hunters
#threat-degree
0
votes
1
answer
A potential occurrence that might compromise your assets is known as __________.
asked
Apr 28, 2020
in
Internet of Things IoT
#potential-security
0
votes
1
answer
Approximate amount spent on security detection and defense technologies to identify and stop advanced threats is _______.
asked
Apr 28, 2020
in
Internet of Things IoT
#threat-security-detection
#security-detection
0
votes
1
answer
Threat hunting and threat detection are same.
asked
Apr 28, 2020
in
Internet of Things IoT
#threat-hunter
#threat-detection
0
votes
1
answer
Threat hunters use __________.
asked
Apr 28, 2020
in
Internet of Things IoT
#threat-hunters
0
votes
0
answers
unique interview questions and answers
asked
Apr 28, 2020
in
Top 100 Questions Answer
#top-100-unique-interview-questions
#top-100-unique-questions
0
votes
0
answers
common interview questions and answers for freshers
asked
Apr 28, 2020
in
Top 100 Questions Answer
#top-interview-questions-answers
0
votes
0
answers
tough interview questions and answers
asked
Apr 28, 2020
in
Top 100 Questions Answer
#top-100-tough-questions
#top-100-tough-interview-questions
Page:
« prev
1
...
169
170
171
172
173
174
175
176
177
178
179
...
221
next »
...