medium
Single Answer
0Fotis was asked to implement a threat-hunting program for his organization. Which one of the following is the basic assumption of a threat-hunting program that he should use as he plans his work?
Answer Options
A
Security controls were designed using a defense-in-depth strategy.
B
Audits may uncover control deficiencies.
C
Attackers may already be present on the network.
D
Defense mechanisms may contain unpatched vulnerabilities.
Correct Answer: C
Explanation
While all of these assumptions are valid premises that Fotis might have going into the exercise, the basic assumption of a threat-hunting exercise is the so-called presumption of compromise. This means that Fotis should assume that attackers have already gained access to his system and then hunt for indicators of their presence.