-
Book Overview & Buying
-
Table Of Contents
Threat Hunting with Elastic Stack
By :
As we conclude, here is a list of questions for you to test your knowledge regarding this chapter's material. You will find the answers in the Assessments section of the Appendix:
a. Processes and methodologies that replace traditional SecOps
b. The new name for SecOps, but essentially the same
c. Processes and methodologies tightly coupled with, and in support of, traditional SecOps
d. Processes to acquire third-party threat feeds
a. Information
b. Data-driven decisions
c. Data
d. Intelligence
a. Reconnaissance
b. Delivery
c. Command & Control
d. Actions on the Objective
a. Lateral Movement
b. Persistence
c. Credential Access
d. Defense Evasion
a. Victim
b. Adversary
c. Capabilities
d. Infrastructure