Which two statements are true regarding vulnerability assessments and threat hunting? (Choose two.)
- Threat hunting is an attempt to take advantage of the organization’s attack surface and breach a system, thereby demonstrating the cybersecurity threats that exist.
- Vulnerability assessments use a list of known vulnerabilities to identify security weaknesses.
- Threat hunting uses insights from threat intelligence sources to proactively discover evidence of adversaries.
- Vulnerability assessments use threat intelligence to identify security weaknesses.
- Threat hunting uses insights from threat intelligence and cybersecurity components (such as a SIEM) to proactively discover evidence of adversaries.
Explanation & Hint:
The two statements that are true regarding vulnerability assessments and threat hunting are:
The other statements are not accurate. Threat hunting is not an attempt to breach a system but rather a proactive effort to uncover existing threats, and vulnerability assessments typically do not use threat intelligence to identify security weaknesses; they focus on known vulnerabilities. |