• Post author:
  • Post category:Blog
  • Reading time:2 mins read
  • Post last modified:June 12, 2024

You are a Tier 3 threat hunter. You and the rest of the SOC team have identified and quarantined a breach. Which two procedures will you, as a threat hunter, now use to determine whether any other systems have been affected by the breach? (Choose two.)

  • perform additional research using the MTRE ATT&CK matrix
  • consult with the NOC team
  • gather additional threat intelligence information from sources like Cisco Talos
  • analyze the logs of all external firewalls
  • perform both vulnerability and penetration scans
Explanation & Hint:

As a Tier 3 threat hunter aiming to determine whether any other systems have been affected by the breach, you should consider the following procedures:

  1. Perform additional research using the MITRE ATT&CK matrix: The MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) matrix is a valuable resource for understanding and tracking adversary tactics and techniques. By conducting additional research using this matrix, you can identify potential indicators of compromise (IOCs) and tactics used by the threat actor, helping you identify other affected systems and potential attack vectors.
  2. Gather additional threat intelligence information from sources like Cisco Talos: Gathering threat intelligence information from reputable sources, such as Cisco Talos, can provide insights into the threat landscape, known threats, and indicators of compromise (IOCs). This information can be used to further assess the scope of the breach and identify any other affected systems or potential threats.

Consulting with the NOC team and analyzing firewall logs can be beneficial for some aspects of incident response but may not be the primary procedures used to identify additional affected systems in the aftermath of a breach. Vulnerability and penetration scans are typically not used at this stage but can be part of a proactive approach to security.

For more Questions and Answers:

Security Operations Center Post-Assessment | CBROPS

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments