exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 107 discussion

Actual exam question from CompTIA's CS0-002
Question #: 107
Topic #: 1
[All CS0-002 Questions]

Which of the following is MOST important when developing a threat hunting program?

  • A. Understanding penetration testing techniques
  • B. Understanding how to build correlation rules within a SIEM
  • C. Understanding security software technologies
  • D. Understanding assets and categories of assets
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
kiduuu
2 years ago
Selected Answer: D
Before a threat hunting program can be developed, it is essential to have a complete understanding of the organization's assets, including the types of assets, where they are located, and their value to the organization. Without this understanding, it is difficult to know what to hunt for, where to look, and what data sources to use.
upvoted 4 times
...
2Fish
2 years, 1 month ago
Selected Answer: D
D. Remember we are talking about "developing the program". Understanding the categories of assets, such as financial, intellectual property, or customer data, helps to prioritize the focus of the threat hunting program and allocate resources effectively. The others are skills that are refined as part of the overall program.
upvoted 3 times
...
Cock
2 years, 2 months ago
Threat hunting is a proactive process of identifying and neutralizing threats that have already infiltrated an organization's systems. In order to effectively hunt for threats, it is essential to have a comprehensive understanding of the organization's assets and the categories of assets that are present within the network. This includes understanding the types of systems, data, and information that are most valuable to the organization, as well as the different attack scenarios that could be used to target these assets. By having a thorough understanding of the organization's assets, the threat hunting team can more effectively prioritize their efforts, focus on the most critical assets, and develop strategies to protect them from potential threats. Additionally, this understanding can inform the development of correlation rules within a SIEM and help the team to better understand the types of security software technologies that are best suited for their needs.
upvoted 2 times
...
catastrophie
2 years, 2 months ago
D is the correct answer. You need to know what the threat is trying to access and how they may go about it to profile them properly. Just like a bank robber, you're not going to search for them in the park. You can have the greatest detectives in the word with the best equipment but if you're looking in the wrong place what good does it do? Why would they be in the park? Is that were the money is kept? Under stand what they want and where they will look, then you can work on building the proper security measures tailored to your specific hunt. Plus you are developing a program here not actively hunting a threat yet.
upvoted 3 times
...
CertKid
2 years, 3 months ago
It should be B - correlating logs in SIEM. You're threat hunting, aka looking for threats within logs to catch what was missed by tools.
upvoted 1 times
...
Jeend
2 years, 3 months ago
Anser C 100% When creating a threat hunting program it is important to start by developing standardized processes to guide threat hunting efforts. Security teams should outline when and how hunting takes place (whether at scheduled intervals, in response to specific triggering actions, or continuously with the help of automated tools), what techniques are to be used, and which people and TOOLS will be responsible for performing specific threat hunting tasks.
upvoted 1 times
...
albano23412415
2 years, 4 months ago
Selected Answer: D
Threat hunters need to have a good understanding of the company's profile, employee behavior, company valuable data, as well as business activities that could be of interest to attackers so they can baseline what is “normal”
upvoted 1 times
...
TeyMe
2 years, 5 months ago
Selected Answer: D
Purpose of a threat is aiming to archive access to systems that hosts data or main goal. Systems = Assets. That's all!
upvoted 1 times
...
forklord72
2 years, 5 months ago
When threat hunting the goal is to seek out anything malicious. I suppose when you are developing a threat hunting program, knowing everything you can about the assets is great but is that going to do you any good for finding threats? If one were to learn about every single component and mechanic of a refrigerator, what good is that going to do someone when a thief is stealing your yogurt while you're sleeping? I think understanding the security software that you would use to seek out threats is more important.
upvoted 1 times
forklord72
2 years, 5 months ago
To add on, when you learn about assets you will also have an understanding of what motives a person might have for intruding your asset, such as some random hungry dude stealing your yogurt. But to seek him out in the night while you're sleeping, a security camera is the perfect tool to find the threat and determine the risk solution you want to implement afterwards. Assets will teach you about the threat actors, not the threats themselves.
upvoted 1 times
...
...
RoVasq3
2 years, 6 months ago
Selected Answer: D
Threat hunters need to have a good understanding of the company's profile, employee behavior, company valuable data, as well as business activities that could be of interest to attackers so they can baseline what is “normal”.
upvoted 2 times
...
jagoichi
2 years, 6 months ago
Selected Answer: D
Answer D It is important first to prioritize the assets I'm going to protect . Whether they are tangible or intangible. This answer encompasses the other options
upvoted 2 times
...
ruba_ali
2 years, 6 months ago
confused
upvoted 1 times
...
Adrian831
2 years, 6 months ago
Selected Answer: C
When creating a threat hunting program it is important to start by developing standardized processes to guide threat hunting efforts. Security teams should outline when and how hunting takes place (whether at scheduled intervals, in response to specific triggering actions, or continuously with the help of automated tools), what techniques are to be used, and which people and TOOLS will be responsible for performing specific threat hunting tasks. I choose C for that word "TOOLS".
upvoted 1 times
...
[Removed]
2 years, 6 months ago
Why wouldn't it be D? I've read many articles on this and most talking about knowing the risks within the environment and knowing what the key assets/information is needed for threat hunting. Once this information is determined a hypothesis on the type/kind of threat actor/hacker can be better determined imo. This to me sounds like D would be the answer.
upvoted 2 times
...
cyberseckid
2 years, 7 months ago
its talking about the program , not the threat hunter him self , you need to know what is in the environment to build hypothesis and scenarios , going with D
upvoted 2 times
Treymb6
2 years, 7 months ago
I second this.
upvoted 1 times
...
...
TheSkyMan
2 years, 7 months ago
Selected Answer: C
My gut says A, but research says C. All the sites I've come across say it's vital for threat hunters to fully understand security tools to be an effective threat hunter. While understanding pentesting would be beneficial, the execution of threat hunting is different. I'll go with C. https://www.stickmancyber.com/cybersecurity-blog/7-threat-hunting-misconceptions https://www.simplilearn.com/skills-to-become-threat-hunter-article
upvoted 2 times
...
shocker111
2 years, 7 months ago
Selected Answer: A
avid124 is right
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago