You are the leading cybersecurity analyst at financial institutions. An anomaly is detected in the network, suggesting a potential security threat. To proactively investigate and mitigate the risk, arrange the following steps in the correct sequence as part of the threat hunting process:1) Investigation2) Collect and process data3) Response4) Hypothesis5) Triggera) 5 –> 3 –> 1 –> 4 –> 2b) 3 –> 2 –> 5 –> 1 –> 4c) 4 –> 1 –> 3 –> 5 –> 2d) 4 –> 2 –> 5 –> 1 –> 3
Philip, a professional hacker, is planning to attack an organization. In order to collect information, he covertly collects information from the target person by maintaining a personal or other relationship with the target person.Which of the following intelligence sources is used by Philip to collect information about the target organization?
Marie, a threat analyst at an organization named TechSavvy, was asked to perform operational threat intelligence analysis to get contextual information about security events and incidents.Which of the following sources does Marie need to use to perform operational threat intelligence analysis?
An organization, namely, Highlander, Inc., decided to integrate threat intelligence into the incident response process for rapid detection and recovery from various security incidents.In which of the following phases of the incident response management does the organization utilize operational and tactical threat intelligence to provide context to the alerts generated by various security mechanisms?
James, a senior threat intelligence officer, was tasked with assessing the success and failure of the threat intelligence program established by the organization. As part of the assessment, James reviewed the outcome of the intelligence program, determined if any improvements were required in the program, and identified the past learnings that can be applied to the future program.Identify the activity performed by James in the above scenario.