Question 5 of 10Pro Only
What are Indicators of Compromise, and how are they used in security monitoring? Describe different types of IOCs and explain how you would operationalize threat intelligence containing IOCs.
Sample answer preview
Indicators of Compromise are artifacts or pieces of forensic evidence that suggest a system or network may have been breached. IOCs serve as signatures of malicious activity, allowing security teams to detect intrusions, investigate incidents, and share threat information with…
IOCindicators of compromisethreat intelligenceIP addressesfile hashesMITRE ATT&CK