Pre Test CTIA

Pre Test CTIA

Professional Development

10 Qs

quiz-placeholder

Similar activities

Computer science

Computer science

University - Professional Development

10 Qs

GUESS THAT WORD IN CYBER!

GUESS THAT WORD IN CYBER!

Professional Development

10 Qs

Let's Play Together

Let's Play Together

University - Professional Development

10 Qs

BSIT 2B Q#3

BSIT 2B Q#3

Professional Development

10 Qs

Sec+ CH.2 Review Test

Sec+ CH.2 Review Test

Professional Development

15 Qs

INTO Artificial Intelligence

INTO Artificial Intelligence

University - Professional Development

10 Qs

Understanding AI Basics

Understanding AI Basics

Professional Development

10 Qs

Impact of Implementing Data in Organisations

Impact of Implementing Data in Organisations

Professional Development

10 Qs

Pre Test CTIA

Pre Test CTIA

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Mohammad Ilahi

Used 12+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Threat intelligence lifecycle.

1) Collection

2) Analysis and Production

3) Planning and Direction

4) Processing and Exploitation

5) Dissemination and Integration

What is the correct sequence of steps involved in a threat intelligence lifecycle?

2), 4), 3), 1), 5)

3), 2), 1), 4), 5)

3), 1), 2), 4), 5)

3), 1), 4), 2), 5)

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Getting all the information from public source and any where that we can get in the internet is part of data collecting in

IMINT

HUMINT

SIGINT

OSINT

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Analyzed and interpreted information providing broader in-depth knowledge of the subject, that supports decision making and response actions. What kind of the definition above?

Information

Data

Operational Environment

Intelligence

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Individuals or Team employed by the government to penetrate and gain top-secret information and to damage information systems of other governments. What kind of the threat actor above?

Hacktivists

State-Sponsored Hackers

Organized Hackers

Insider Threat

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

In which of the following attacks does the attacker exploit vulnerabilities in a computer application before the software developer can release a patch for them?

Advanced persistent attack

Active online attack

Zero-day attack

Distributed network attack

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

During the process of threat intelligence analysis, John, a threat analyst, successfully extracted an indication of adversary’s information, such as information on specific indicators of compromise consumed SOC staff, and IR Teams. Identify the type of threat intelligence analysis is performed by John?

Tactical threat intelligence analysis

Operational threat intelligence analysis

Strategic threat intelligence analysis

Technical threat intelligence analysis

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

In which of the following attacks that focuses on stealing information from the victim machine without its user being aware of it. These attacks are generally targeted at large companies and Government networks and are slow in nature, so the effects on computer performance and internet connections are negligible. And exploit vulnerabilities in the applications running on a computer, operating system, and embedded systems.

Advanced persistent attack

Active online attack

Zero-day attack

Distributed network attack

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?