Question No : 1
Why is it critical to develop a baseline of normal behavior before conducting threat hunting in an ICS environment?
정답:
Question No : 2
What is one major limitation of signature-based detection systems in ICS environments?
정답:
Question No : 3
Which tool is commonly used for monitoring network traffic in ICS environments?
정답:
Question No : 4
Which tool or technology is commonly used for active defense in ICS environments to detect anomalies in network traffic?
정답:
Question No : 5
How does active defense in ICS environments differ from passive defense?
정답:
Question No : 6
Which of the following steps should be taken first when responding to a cybersecurity incident in an ICS environment?
정답:
Question No : 7
Why is it important to use both automated tools and manual techniques during threat hunting in ICS environments?
정답:
Question No : 8
What is the key purpose of having an incident response plan in place for ICS environments?
정답:
Question No : 9
What is a common challenge in conducting threat hunting in ICS environments?
정답:
Question No : 10
Which of the following is a key factor when determining whether a detected anomaly is a legitimate threat?
정답:
Question No : 11
Which of the following best describes the value of threat intelligence in ICS environments?
정답:
Question No : 12
How can active defense help prevent the exploitation of known vulnerabilities in an ICS environment?
정답:
Question No : 13
How does visibility into communication flows between devices help enhance security in an ICS environment?
정답:
Question No : 14
Why is it important to monitor both internal and external traffic in an ICS environment?
정답:
Question No : 15
Which detection technique is commonly used to monitor unauthorized changes to configurations in ICS environments?
정답: