• Post author:
  • Post category:Blog
  • Reading time:2 mins read
  • Post last modified:June 12, 2024

Which two statements are true regarding vulnerability assessments and threat hunting? (Choose two.)

  • Threat hunting is an attempt to take advantage of the organization’s attack surface and breach a system, thereby demonstrating the cybersecurity threats that exist.
  • Vulnerability assessments use a list of known vulnerabilities to identify security weaknesses.
  • Threat hunting uses insights from threat intelligence sources to proactively discover evidence of adversaries.
  • Vulnerability assessments use threat intelligence to identify security weaknesses.
  • Threat hunting uses insights from threat intelligence and cybersecurity components (such as a SIEM) to proactively discover evidence of adversaries.
Explanation & Hint:

The two statements that are true regarding vulnerability assessments and threat hunting are:

  1. Vulnerability assessments use a list of known vulnerabilities to identify security weaknesses: Vulnerability assessments typically rely on databases of known vulnerabilities to identify security weaknesses in an organization’s systems, applications, and infrastructure. They are designed to pinpoint vulnerabilities based on existing knowledge of security flaws.
  2. Threat hunting uses insights from threat intelligence and cybersecurity components (such as a SIEM) to proactively discover evidence of adversaries: Threat hunting involves the proactive exploration of an organization’s network and systems to uncover evidence of potential adversaries or security threats. It often leverages insights from threat intelligence sources and may use cybersecurity components like a SIEM (Security Information and Event Management) system to assist in the hunt for suspicious or malicious activity.

The other statements are not accurate. Threat hunting is not an attempt to breach a system but rather a proactive effort to uncover existing threats, and vulnerability assessments typically do not use threat intelligence to identify security weaknesses; they focus on known vulnerabilities.

For more Questions and Answers:

Security Operations Center Post-Assessment | CBROPS

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments