medium
Single Answer
0

Fotis was asked to implement a threat-hunting program for his organization. Which one of the following is the basic assumption of a threat-hunting program that he should use as he plans his work?

Answer Options

A

Security controls were designed using a defense-in-depth strategy.

B

Audits may uncover control deficiencies.

C

Attackers may already be present on the network.

D

Defense mechanisms may contain unpatched vulnerabilities.

Correct Answer: C

Explanation

While all of these assumptions are valid premises that Fotis might have going into the exercise, the basic assumption of a threat-hunting exercise is the so-called presumption of compromise. This means that Fotis should assume that attackers have already gained access to his system and then hunt for indicators of their presence.