As a proactive threat-hunting technique, hunters must develop situational cases based on likely attack scenarios derived from the available threat intelligence information. After forming the basis of the scenario, which of the following may the threat hunter construct to establish a framework for threat assessment?

A. Critical assert list
B. Threat vector
C. Attack profile
D. Hypothesis


Answer: D. Hypothesis

Computer Science & Information Technology

You might also like to view...

Computer ____________________ is defined as the use of technical investigation and analysis techniques to identify, collect, preserve, and analyze electronic items of potential evidentiary value so that they may be admitted as evidence in a court of law, used to support administrative action, or simply used to further analyze suspicious data.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

You should make sure that unavailable screen options are either dimmed (also called ____) or removed.

A. grayed B. hidden C. suppressed D. blanked

Computer Science & Information Technology

In addition to the paragraph and heading elements, there are several other ____ text elements.

A. block-level B. phrase level C. inline D. formatting

Computer Science & Information Technology

The process for setting the ____________________ license for a Flickr photo is straightforward.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology