Quiz Day 1 - CTIA - Konsep Cyber Threat Intelligence

Quiz Day 1 - CTIA - Konsep Cyber Threat Intelligence

Professional Development

20 Qs

quiz-placeholder

Similar activities

Nhames Project Limited

Nhames Project Limited

Professional Development

21 Qs

Security and Domain

Security and Domain

Professional Development

20 Qs

Security SY0701

Security SY0701

Professional Development

20 Qs

Video Games

Video Games

2nd Grade - Professional Development

15 Qs

Kuiz Umum ICT Sempena Minggu ICT 2023

Kuiz Umum ICT Sempena Minggu ICT 2023

Professional Development

17 Qs

Mengaplikasikan Teknologi AI dalam Perkembangan Usahawan

Mengaplikasikan Teknologi AI dalam Perkembangan Usahawan

Professional Development

15 Qs

Information Security Horizons

Information Security Horizons

Professional Development

22 Qs

Power BI - Game 1

Power BI - Game 1

Professional Development

20 Qs

Quiz Day 1 - CTIA - Konsep Cyber Threat Intelligence

Quiz Day 1 - CTIA - Konsep Cyber Threat Intelligence

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Mohammad Ilahi

Used 5+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Advanced persistent threat (APT) is ...

define as a type of network attack where attacker gains unauthorized access to a target network and remains there undetected for a long period of time.

huge network compromised systems used by attackers to perform denial-of-services attacks.

defined as the collection and analysis of information about threats and adversaries.

the clues/artifact/pieces of forensic data that is found on a network that indicates a potential intrusion or malicious activity.

2.

FILL IN THE BLANK QUESTION

2 mins • 1 pt

... is a layer of online cyberspace that consists of web pages and content that are hidden and unindexed.

3.

FILL IN THE BLANK QUESTION

2 mins • 1 pt

... is a deeper layer of online cyberspace and it is the subset of deep web and enables everyone to navigate anonymously without being traced.

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A process that utilizes information to analyze and respond to emerging requirements of an organization is definition of.

Intelligence

Vulnerability

Exploit

Data

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

... is a possibility of performing malicious actions to damage the critical IT resources of a target organization.

Cyber Threat

Vulnerability

Zero-Day Attack

Exploit

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

There are 3 stages in achieving the intelligence called ...

unknown unknowns - known unknowns - known knowns

unknown unknowns - known knowns - known unknowns

known knowns - known unknowns - unknown unknowns

unknown unknowns - unknown knowns - known knowns

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Michael, a threat analyst at an organization named Tech Top, was asked to conduct a cyber-threat intelligence analysis. After obtaining information regarding threats, he has started analyzing the information and understanding the nature of the threats. What stage of the cyber-threat intelligence is Michael currently in?

Known unknowns

Unknown unknowns

Known knowns

Unknowns unknown

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?