Free CCFH-202 Exam Braindumps (page: 9)

Page 8 of 23

Which tool allows a threat hunter to populate and colorize all known adversary techniques in a single view?

  1. MISP
  2. OWASP Threat Dragon
  3. Open XDR
  4. MITRE ATT&CK Navigator

Answer(s): D



Which of the following is an example of actor actions during the RECONNAISSANCE phase of the Cyber Kill Chain?

  1. Installing a backdoor on the victim endpoint
  2. Discovering internet-facing servers
  3. Emailing the intended victim with a malware attachment
  4. Loading a malicious payload into a common DLL

Answer(s): B



Which threat framework allows a threat hunter to explore and model specific adversary tactics and techniques, with links to intelligence and case studies?

  1. MITRE ATT&CK
  2. Lockheed Martin Cyber Kill Chain
  3. Director of National Intelligence Cyber Threat Framework
  4. NIST 800-171 Cyber Threat Framework

Answer(s): A



In the MITRE ATT&CK Framework (version 11 - the newest version released in April 2022), which of the following pair of tactics is not in the Enterprise: Windows matrix?

  1. Persistence and Execution
  2. Impact and Collection
  3. Privilege Escalation and Initial Access
  4. Reconnaissance and Resource Development

Answer(s): D






Post your Comments and Discuss CrowdStrike CCFH-202 exam with other Community members:

CCFH-202 Discussions & Posts