As a proactive threat-hunting technique, hunters must develop situational cases based on likely attack scenarios derived from the available threat intelligence information. After forming the basis of the scenario, which of the following may the threat hunter construct to establish a framework for threat assessment?

A. Critical assert list
B. Threat vector
C. Attack profile
D. Hypothesis

Answer: D. Hypothesis

Computer Science & Information Technology

You might also like to view...

Match the following terms to their meanings:

I. Modal II. Macro III. Pop-up IV. Caption V. Dialog A. Thick border style property setting that can include a title bar with a Close button B. Text entered on this property displays on the title bar of the form when in Form view C. Until this window is closed, the focus cannot be changed to another database object D. Double-clicking the name of this causes it to execute E. Setting this property setting to "No" can display the Minimize and Maximize buttons

Computer Science & Information Technology

The numbers along the left side of a slide refer to the ________ on the slide

Fill in the blank(s) with correct word

Computer Science & Information Technology