Pre Test CTIA
Quiz
•
Computers
•
Professional Development
•
Medium
Mohammad Ilahi
Used 12+ times
FREE Resource
Enhance your content
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Threat intelligence lifecycle.
1) Collection
2) Analysis and Production
3) Planning and Direction
4) Processing and Exploitation
5) Dissemination and Integration
What is the correct sequence of steps involved in a threat intelligence lifecycle?
2), 4), 3), 1), 5)
3), 2), 1), 4), 5)
3), 1), 2), 4), 5)
3), 1), 4), 2), 5)
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Getting all the information from public source and any where that we can get in the internet is part of data collecting in
IMINT
HUMINT
SIGINT
OSINT
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Analyzed and interpreted information providing broader in-depth knowledge of the subject, that supports decision making and response actions. What kind of the definition above?
Information
Data
Operational Environment
Intelligence
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Individuals or Team employed by the government to penetrate and gain top-secret information and to damage information systems of other governments. What kind of the threat actor above?
Hacktivists
State-Sponsored Hackers
Organized Hackers
Insider Threat
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
In which of the following attacks does the attacker exploit vulnerabilities in a computer application before the software developer can release a patch for them?
Advanced persistent attack
Active online attack
Zero-day attack
Distributed network attack
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
During the process of threat intelligence analysis, John, a threat analyst, successfully extracted an indication of adversary’s information, such as information on specific indicators of compromise consumed SOC staff, and IR Teams. Identify the type of threat intelligence analysis is performed by John?
Tactical threat intelligence analysis
Operational threat intelligence analysis
Strategic threat intelligence analysis
Technical threat intelligence analysis
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
In which of the following attacks that focuses on stealing information from the victim machine without its user being aware of it. These attacks are generally targeted at large companies and Government networks and are slow in nature, so the effects on computer performance and internet connections are negligible. And exploit vulnerabilities in the applications running on a computer, operating system, and embedded systems.
Advanced persistent attack
Active online attack
Zero-day attack
Distributed network attack
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple

Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
10 questions
Programming Knowledge Quiz (Medium)
Quiz
•
5th Grade - Professio...
10 questions
Scratch
Quiz
•
KG - Professional Dev...
13 questions
ISC2 - Chapter 1 - Module 3 - G2
Quiz
•
Professional Development
10 questions
QR Code
Quiz
•
Professional Development
10 questions
Quiz BIMTEK TIK
Quiz
•
Professional Development
15 questions
DBMS Quizzz....!
Quiz
•
Professional Development
15 questions
AI in Marketing Strategies
Quiz
•
Professional Development
10 questions
OFFICE 365
Quiz
•
Professional Development
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
11 questions
NEASC Extended Advisory
Lesson
•
9th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
10 questions
Boomer ⚡ Zoomer - Holiday Movies
Quiz
•
KG - University
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
20 questions
Multiplying and Dividing Integers
Quiz
•
7th Grade