A. Automated patch management
B. Real-time query and remediation
C. Live response capabilities
D. Physical network monitoring
A. Writing the query in a word processor and pasting it into the console
B. Using the console's built-in query builder tool
C. Directly typing the SQL command into the console
D. Uploading a .sql file
A. Using HTTP protocols
B. Through a continuous, real-time connection
C. Periodically, based on pre-defined intervals
D. Only over a private network
A. Duration of the hunting session
B. Number of queries run
C. Identification of potential security threats
D. Elimination of false positives
A. Informing all employees via email
B. Conducting a root cause analysis
C. Applying appropriate remediation measures
D. Ignoring the threat until it escalates
A. Employing parameterized queries
B. Using simple, straightforward queries
C. Restricting query length
D. Avoiding the use of the WHERE clause
A. Checking the power supply
B. Restarting the computer
C. Watering the plants nearby
D. Painting the computer case
A. To check for system updates once a year
B. To track hourly resource usage
C. To monitor daily user activity
D. For a one-time data extraction