CTI from zero to hero

CTI from zero to hero

1st - 3rd Grade

15 Qs

quiz-placeholder

Similar activities

IT Product

IT Product

1st - 10th Grade

10 Qs

Quiz about Kavra

Quiz about Kavra

KG - 12th Grade

13 Qs

Aquatic Habitats

Aquatic Habitats

2nd Grade

10 Qs

Quizz agriculture

Quizz agriculture

1st Grade

15 Qs

TRATEGIC ALLIANCES AND NETWORKS

TRATEGIC ALLIANCES AND NETWORKS

KG - University

10 Qs

Teste - Fonética e fonologia.

Teste - Fonética e fonologia.

1st Grade

10 Qs

First aid

First aid

3rd Grade

10 Qs

Le CPC

Le CPC

1st - 3rd Grade

10 Qs

CTI from zero to hero

CTI from zero to hero

Assessment

Quiz

Other

1st - 3rd Grade

Hard

Created by

Nee No

Used 18+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Let's test your ability to find the right answer

1+1=3

x3x3=x9x^3\cdot x^3=x^9

false

CTI=Cyber Threat Intelligence

2.

MULTIPLE CHOICE QUESTION

20 sec • Ungraded

Which is the best background for a CTI talk?

Media Image
Media Image
Media Image
Media Image

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What makes something a threat?

Capability, Opportunity and Intent

Capability, Infrastructure and Opportunity

Loss of Confidentiality, Availability and Integrity

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Is there any platform or tool we can get to create threat intelligence?

A decompiler

A Threat Intelligence Platform

A Malware Information Sharing Platform

No, there isn't

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which are the five phases of the Cyber Threat Intelligence Cycle?

Planning & Direction, collection&processing, exploitation& analysis, dissemination&feedback

collection&processing, exploitation& analysis, dissemination&feedback

Planning & Direction, collection, processing&exploitation, analysis&production, dissemination&feedback

Planning & Direction, collection&processing, exploitation, analysis&production, dissemination&feedback

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which are the core features of an intrusion event

Adversary, TTPs, Capabilities, Victim

Adversary, Infrastructure, Capabilities, Victim

Adversary, motivation, intent, opportunity

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

If a RAT running on a compromised host is discovered, in which phase of the killchain should we report this event?

Reconnaissance

Installation

C2

Action on Objectives

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?