You are a Tier 3 threat hunter. You and the rest of the SOC team have identified and quarantined a breach. Which two procedures will you, as a threat hunter, now use to determine whether any other systems have been affected by the breach? (Choose two.)
- perform additional research using the MTRE ATT&CK matrix
- consult with the NOC team
- gather additional threat intelligence information from sources like Cisco Talos
- analyze the logs of all external firewalls
- perform both vulnerability and penetration scans
Explanation & Hint:
As a Tier 3 threat hunter aiming to determine whether any other systems have been affected by the breach, you should consider the following procedures:
Consulting with the NOC team and analyzing firewall logs can be beneficial for some aspects of incident response but may not be the primary procedures used to identify additional affected systems in the aftermath of a breach. Vulnerability and penetration scans are typically not used at this stage but can be part of a proactive approach to security. |