Graded Quiz: Threat Hunting and Threat Intelligence :Penetration Testing, Threat Hunting, and Cryptography (IBM Cybersecurity Analyst Professional Certificate) Answers 2025
1. Question 1 — What distinguishes unstructured hunting?
-
❌ Unstructured hunting is limited to physical security
-
❌ Unstructured hunting uses IoCs
-
❌ Unstructured hunting uses preset detection rules
-
✅ Unstructured hunting relies on published threat intelligence reports
Explanation:
Unstructured hunting = starting from external threat intelligence and hunting based on known adversary behaviors—not defined rules or IoCs.
2. Question 2 — Threat hunting method aligned with MITRE ATT&CK
-
❌ Hypothesis hunting
-
❌ Situational hunting
-
❌ Custom hunting
-
✅ Intel-based hunting
Explanation:
Intel-based hunting uses known adversary techniques mapped to MITRE ATT&CK.
3. Question 3 — Best medium for communicating threat findings
-
❌ Informal meetings
-
✅ Intelligence reports, alerts, briefings, daily updates, dashboards
-
❌ Public announcements
-
❌ Social media posts
Explanation:
Threat intelligence must be communicated formally, clearly, and actionably.
4. Question 4 — Key objective of the feedback step
-
✅ Refining intelligence requirements and guiding future data collection
-
❌ Analyzing data
-
❌ Gathering raw data
-
❌ Presenting findings
Explanation:
Feedback improves the TI cycle by adjusting priorities and intelligence needs.
5. Question 5 — SIEM component for collecting & analyzing event data
-
❌ Log management
-
✅ Event correlation and analytics
-
❌ Incident monitoring
-
❌ Compliance reporting
Explanation:
Event correlation analyzes multiple logs/events to detect patterns and attacks.
6. Question 6 — Advantage of integrating 3rd-party threat intelligence into SIEM
-
❌ Automatic resolution
-
❌ Automated compliance
-
✅ Cross-referencing internal data with external threat signatures
-
❌ Enhanced visualization
Explanation:
External TI enables SIEM to match logs with known threats for faster detection.
7. Question 7 — AI advantage when severity is unclear
-
❌ Provides dashboards
-
❌ Auto-blocks threats
-
✅ Provides detailed severity, origin, and impact analysis
-
❌ Multi-language reports
Explanation:
AI analyzes patterns and context to assess threat seriousness.
8. Question 8 — Benefit of NLP in threat intelligence
-
❌ Optimize networks
-
❌ Design infrastructure
-
❌ Write code
-
✅ Analyze unstructured data for insights
Explanation:
NLP extracts meaning from threat reports, blogs, dark-web chatter, etc.
9. Question 9 — Kill Chain phase where attacker creates malware
-
❌ Exploitation
-
✅ Weaponization
-
❌ Delivery
-
❌ Reconnaissance
Explanation:
Weaponization = creating malware + exploit payloads before delivery.
10. Question 10 — “Capability” in Diamond Model
-
❌ Technical resources
-
✅ Specific tools and techniques used during the attack
-
❌ Victim
-
❌ Motivation
Explanation:
Capability = malware, exploits, procedures, and skills used by the adversary.
🧾 Summary Table
| Q | Correct Answer | Key Concept |
|---|---|---|
| 1 | Unstructured hunting uses TI reports | Hunting methods |
| 2 | Intel-based hunting | MITRE ATT&CK alignment |
| 3 | Reports, alerts, dashboards | Stakeholder communication |
| 4 | Refine requirements | Threat intel cycle |
| 5 | Event correlation | SIEM core function |
| 6 | Cross-reference external TI | SIEM + TI advantage |
| 7 | Severity + impact analysis | AI threat intelligence |
| 8 | NLP analyzes unstructured data | NLP value |
| 9 | Weaponization | Cyber Kill Chain |
| 10 | Tools & techniques | Diamond Model |