In the MITRE ATT&CK Framework (version 11 - the newest version released in April 2022), which of the following pair of tactics is not in the Enterprise: Windows matrix?
In which of the following stages of the Cyber Kill Chain does the actor not interact with the victim endpoint(s)?
What information is provided from the MITRE ATT&CK framework in a detection's Execution Details?
You need details about key data fields and sensor events which you may expect to find from Hosts running the Falcon sensor. Which documentation should you access?
The Events Data Dictionary found in the Falcon documentation is useful for writing hunting queries because:
Which of the following is a suspicious process behavior?