---Advertisement---
Digital Security

Threat Hunting Interview Question-Answer

By Smart Answer

Updated on:

---Advertisement---

Q.1 Threat hunters will be able to offer a high degree of protection only if there is a _____________.

       A. Moderate level of visibility into networks

       B. High level of visibility into networks

       C. Low level of visibility into networks

       D. None of these

Ans : High level of visibility into networks


Q.2 Threat hunters use __________.

       A. Automated tools

       B. Manual methods

       C. Both the options

       D. None of the options

Ans : Both the options


Q.3 Approximate amount spent on security detection and defense technologies to identify and stop advanced threats is _______.

       A. $850000

       B. $750000

       C. $650000

       D. $550000

Ans : $550000


Q.4 Which of the following are threat hunting platforms?

       A. Sqrrl

       B. Infocyte

       C. Endgame Inc

       D. Vectra

       E. All the Options

Ans : All the Options


Q.5 Which of the following are threat hunting techniques?

       A. Stack counting

       B. Clustering

       C. Grouping

       D. All the Options

Ans : All the Options


Q.6 Which threat hunting platform was acquired by Amazon Web Services?

       A. Maltego

       B. Exabeam

       C. Vectra

       D. Sqrrl

Ans : Sqrrl


Q.7 Which of the following is the cyber threat intelligence model that have been widely used in the industry?

       A. The Diamond Model of intrusion analysis

       B. The Cyber Kill Chain

       C. None of the options

       D. Both the options

Ans : Both the options


Q.8 _____________ is used for identification and prevention of cyber intrusions.

       A. Hunting maturity model

       B. Cyber kill chain

       C. Hunting loop

       D. Hunting Matrix

Ans : Cyber kill chain


Q.9 Which of the following is a stage in Cyber Kill Chain?

       A. Reconnaissance

       B. Actions on Objectives

       C. Installation

       D. Delivery

       E. All the Options

Ans : All the Options


Q.10 Who developed hunting maturity model?

       A. David Bianco, a infocyte’s security technologist

       B. David Bianco, a Maltego’s security technologist

       C. David Bianco, a Sqrrl’s security technologist

       D. David Bianco, a Vectra’s security technologist

Ans : David Bianco, a Sqrrl’s security technologist


Q.11 ______ is a proactive way of hunting attacks.

       A. Cyber security

       B. Threat hunting

       C. Threat intelligence

       D. Threat modeling

Ans : Threat hunting


Q.12 _______ includes the information relevant to protecting an organization from external and internal threats and also the processes, policies and tools designed to gather and analyze that information.

       A. Threat Modeling

       B. Threat Hunting

       C. Threat Intelligence

       D. None of the options

Ans : Threat Intelligence


Q.13 In data flow diagrams (DFD), the data flow shape represents boundary between trust levels or privileges.

       A. True

       B. False

Ans : True


Q.14 The process of designing a security specification and then eventually testing that specification is known as __________.

       A. Threat modeling

       B. Threat hunting

       C. Threat intelligence

       D. Threat mitigation

Ans : Threat modeling


Q.15 Which of the following are threat modeling tools?

       A. Securicor

       B. Irius Risk

       C. Threat Modeler

       D. All the Options

Ans : All the Options


Q.16 Which of the following is not a phase in hunting loop?

       A. Inform and enrich analytics

       B. Uncover new patterns and TTP’s

       C. Creating hypothesis

       D. Innovative approach

Ans : Uncover new patterns and TTP’s


Q.17 Which of the following is an adaptation of the U.S. military’s kill chain process?

       A. The Cyber Kill Chain

       B. The Active Cyber Defense Cycle

       C. The Diamond Model of intrusion analysis

       D. None of the options

Ans : The Cyber Kill Chain


Q.18 EDR stands for _______.

       A. End point Detection and Response

       B. End point Defect and Response

       C. End point Defense and detective

       D. Earlier defense and response

Ans : End point Detection and Response


Q.19 Which of the following are the aspects of threat modeling?

       A. Killing the threats

       B. Understanding the threats

       C. Categorizing the threats

       D. Identify mitigation strategies

       E. Identify mitigation strategies Categorizing the threats

Ans : Categorizing the threats


Q.20 Full form of TTP is ____________.

       A. Tactics, techniques and process

       B. Tactics, techniques and procedures

       C. Tactics, technology and process

       D. Tactics, technology and procedures

Ans : Tactics, techniques and procedures


Q.21 Threat hunting should not be conducted by external service provider.

       A. True

       B. False

Ans : False


Q.22 Threat Hunting is Proactive Approach.

       A. True

       B. False

Ans : True


Q.23 Which of the following is perfect for highlighting the continuous process improvement?

       A. Hunting matrix

       B. Hunting loop

       C. Hunting maturity model

       D. None of the options

Ans : Hunting maturity model


Q.24 Modifying a data within the system to achieve a malicious goal is known as __________.

       A. Information disclosure

       B. Tampering

       C. Spoofing

       D. Denial of service

Ans : Tampering


Q.25 Which level of hunting maturity model mainly focuses on automated alerts?

       A. Leading

       B. Minimal

       C. Procedural

       D. Initial

Ans : Initial


Q.26 In the word STRIDE, R stand for _________.

       A. Reduction

       B. Reproducibility

       C. Remediation

       D. Repudiation

Ans : Repudiation


Q.27 HMM stands for ___________.

       A. Hunting modernity model

       B. Hunting magnification model

       C. Hunting maturity model

       D. Hunting matrix model

Ans : Hunting maturity model


Q.28 An organization should focus mainly on ___________.

       A. Internal threats

       B. External threats

       C. Both the options

       D. None of the options

Ans : Both the options


Q.29 Which of the following is the cyber threat intelligence model that have been widely used in the industry?

       A. The Diamond Model of intrusion analysis

       B. The Cyber Kill Chain

       C. Both the options

       D. None of the options

Ans : Both the options


Smart Answer

---Advertisement---

Related Post

Cyber Security Interview Question-Answer Part – 3

Cybersecurity Prologue Interview Question-Answer Cyber Security Interview Question-Answer Part – 1 Cyber Security Interview Question-Answer Part – 2 Q.1 Which of the following can also consider as the ...

Cyber Security Interview Question-Answer Part – 2

Cybersecurity Prologue Interview Question-Answer Cyber Security Interview Question- – 1 Cyber Security Interview Question- – 3 Q.1 Which of the following can be considered as the elements of ...

Cyber Security Interview Question-Answer

Cybersecurity Prologue Interview Question-Answer Cyber Security Interview Question-Answer Part – 2 Cyber Security Interview Question-Answer Part – 3 Q.1 Which of the following refers to stealing one’s idea ...

User Authentication Interview Question-Answer part – 2

Authentication Interview Question-Answer Q.1 Which of the following is a good practice?        A. Give full permission for remote transferring        B. Grant read ...

Leave a Comment