| Q1 | Primary difference between threat hunting and incident response? | C) Threat hunting is proactive; incident response is reactive |
| Q2 | Main goal of threat hunting? | B) To proactively discover threats that have evaded security solutions |
| Q3 | Which is NOT a phase in the threat hunting methodology? | C) Data Destruction |
| Q4 | What does behavioral detection focus on? | C) Anomalies in user behavior, network, or system processes |
| Q5 | Tool commonly used by threat hunters to analyze logs? | A) SIEM (Security Information and Event Management) |
| Q6 | What is a "Hypothesis-driven" hunt? | C) A hunt based on a "what if" scenario regarding adversary behavior |
| Q7 | What is an Indicator of Compromise (IOC)? | B) An observable sign that a system may have been compromised |
| Q8 | Framework used to classify adversary techniques and tactics? | B) MITRE ATT&CK |
| Q9 | The Diamond Model of Intrusion Analysis is used to: | B) Analyze and visualize cyber threat activities |
| Q10 | What does the Threat Hunting Maturity Model measure? | C) The capability of an organization to detect threats |
| Q11 | Which HTTP method is frequently analyzed for malicious activity? | D) All of the above |
| Q12 | Benefit of machine learning in threat hunting? | B) It helps identify patterns and anomalies in large datasets |