
Threat Hunting VS Threat Intellegence
Flashcard
•
Computers
•
Vocational training
•
Hard
K Wong
FREE Resource
Student preview

38 questions
Show all answers
1.
FLASHCARD QUESTION
Front
Threat Intelligence
Back
The process of collecting, analyzing, and sharing information about external threats, adversaries, vulnerabilities, and attack techniques to inform defensive decisions.
2.
FLASHCARD QUESTION
Front
Threat Hunting
Back
A proactive, hypothesis-driven practice that assumes breach and searches internally for undetected threats using logs, telemetry, and network data.
3.
FLASHCARD QUESTION
Front
Proactive Security
Back
Security actions taken to identify or prevent threats before an alert or incident occurs.
4.
FLASHCARD QUESTION
Front
Reactive Security
Back
Security actions taken in response to detected alerts or confirmed incidents.
5.
FLASHCARD QUESTION
Front
Assume Breach
Back
A security mindset that treats internal systems as potentially compromised, driving proactive investigation.
6.
FLASHCARD QUESTION
Front
Indicator of Compromise (IoC)
Back
An observable artifact such as an IP address, file hash, or domain that suggests malicious activity.
7.
FLASHCARD QUESTION
Front
Tactics, Techniques, and Procedures (TTPs)
Back
The behaviors and methods used by threat actors to conduct attacks and achieve objectives.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?