Search Header Logo
Threat Hunting VS Threat Intellegence

Threat Hunting VS Threat Intellegence

Assessment

Flashcard

Computers

Vocational training

Hard

Created by

K Wong

FREE Resource

Student preview

quiz-placeholder

38 questions

Show all answers

1.

FLASHCARD QUESTION

Front

Threat Intelligence

Back

The process of collecting, analyzing, and sharing information about external threats, adversaries, vulnerabilities, and attack techniques to inform defensive decisions.

2.

FLASHCARD QUESTION

Front

Threat Hunting

Back

A proactive, hypothesis-driven practice that assumes breach and searches internally for undetected threats using logs, telemetry, and network data.

3.

FLASHCARD QUESTION

Front

Proactive Security

Back

Security actions taken to identify or prevent threats before an alert or incident occurs.

4.

FLASHCARD QUESTION

Front

Reactive Security

Back

Security actions taken in response to detected alerts or confirmed incidents.

5.

FLASHCARD QUESTION

Front

Assume Breach

Back

A security mindset that treats internal systems as potentially compromised, driving proactive investigation.

6.

FLASHCARD QUESTION

Front

Indicator of Compromise (IoC)

Back

An observable artifact such as an IP address, file hash, or domain that suggests malicious activity.

7.

FLASHCARD QUESTION

Front

Tactics, Techniques, and Procedures (TTPs)

Back

The behaviors and methods used by threat actors to conduct attacks and achieve objectives.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?