Uncover chapter quiz

Quiz

Uncover chapter quiz

No grades. The point is to push your thinking. Tap an option to see if it lands.

A threat intel feed says a particular domain is associated with a known campaign. The analyst sees the same domain in firewall logs from one host. What is the right next step?

Which level of MITRE ATT&CK changes most often?

An investigation needs to know if a file ever ran on an endpoint. Which data source answers this most directly?

The Uncover narrative concludes with a chain of MITRE techniques. Why is the chain more useful than free-form prose?

An analyst is investigating a possible compromise on a macOS developer workstation. The user's role legitimately involves scripting, IDE plugin processes, and encrypted outbound traffic. What does the methodology require Uncover to produce if the evidence supports a false-positive verdict?

Risk receives an Uncover handoff. Which of these decisions is Risk authorized to make?

Need a nudge?

Risk is not response.

During Uncover, a TLS certificate associated with a known C2 campaign appears in proxy logs from one internal host. The threat-intel feed labels it medium confidence, 30 days old. What is the right next move?

The five intelligence-use patterns Uncover relies on most are indicator matching, attribution, TTP hunting, automated enrichment, and dark-web monitoring. Which one is most durable against an adversary that changes tools every campaign?

Next up

Transition to Risk

Continue