exam questions

Exam 212-82 All Questions

View all questions & answers for the 212-82 exam

Exam 212-82 topic 1 question 14 discussion

Actual exam question from ECCouncil's 212-82
Question #: 14
Topic #: 1
[All 212-82 Questions]

Mark, a security analyst, was tasked with performing threat hunting to detect imminent threats in an organization's network. He generated a hypothesis based on the observations in the initial step and started the threat hunting process using existing data collected from DNS and proxy logs.
Identify the type of threat hunting method employed by Mark in the above scenario.

  • A. Entity-driven hunting
  • B. TTP-driven hunting
  • C. Data-driven hunting
  • D. Hybrid hunting
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
044f354
1 month, 3 weeks ago
Selected Answer: C
Certified Cybersecurity Technician Courseware Module 08 Page 1017 Data-driven Hunting: Generating a hypothesis from observations is the initial step in hunting activities. It is a simple process of searching for what analysts can hunt from existing data. Organizations check DNS data and proxy logs for hunting.
upvoted 1 times
...
kikkie
5 months, 3 weeks ago
Data -driven hunting CCT Module 8 ,page 1017 -Types of threat hunting Methods
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago