What is the basic principle underlying threat hunting activities?
Assumption of Compromise
What security technology best assists with the automation of security workflows?
SOAR
What approach to threat identification begins with a listing of all resources owned by the organization?
Asset-focused
The analysis of adversary TTP includes tools, techniques, and policies.
FALSE
What type of organization facilitates cybersecurity information sharing among a industry-specific communities?
ISAC
Which of the following is a standardized language used to communicate security information between systems and organizations
STIX
Which one of the following is not an example of an open source intelligence resource?
IP Reputation Service