Quiz Day 1 - CTIA - Konsep Cyber Threat Intelligence

Quiz Day 1 - CTIA - Konsep Cyber Threat Intelligence

Professional Development

20 Qs

quiz-placeholder

Similar activities

Curso AEMPS: librerías y BBDD

Curso AEMPS: librerías y BBDD

Professional Development

15 Qs

Security Domain

Security Domain

Professional Development

20 Qs

Security

Security

Professional Development

20 Qs

R&D Days

R&D Days

Professional Development

15 Qs

แบบทดสอบ Ai and Machine Learning

แบบทดสอบ Ai and Machine Learning

Professional Development

20 Qs

CCSP Domain 1

CCSP Domain 1

Professional Development

19 Qs

Introduction to Cybersecurity + linux

Introduction to Cybersecurity + linux

Professional Development

16 Qs

artificial intelligence

artificial intelligence

Professional Development

20 Qs

Quiz Day 1 - CTIA - Konsep Cyber Threat Intelligence

Quiz Day 1 - CTIA - Konsep Cyber Threat Intelligence

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Mohammad Ilahi

Used 5+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Advanced persistent threat (APT) is ...

define as a type of network attack where attacker gains unauthorized access to a target network and remains there undetected for a long period of time.

huge network compromised systems used by attackers to perform denial-of-services attacks.

defined as the collection and analysis of information about threats and adversaries.

the clues/artifact/pieces of forensic data that is found on a network that indicates a potential intrusion or malicious activity.

2.

FILL IN THE BLANK QUESTION

2 mins • 1 pt

... is a layer of online cyberspace that consists of web pages and content that are hidden and unindexed.

3.

FILL IN THE BLANK QUESTION

2 mins • 1 pt

... is a deeper layer of online cyberspace and it is the subset of deep web and enables everyone to navigate anonymously without being traced.

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A process that utilizes information to analyze and respond to emerging requirements of an organization is definition of.

Intelligence

Vulnerability

Exploit

Data

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

... is a possibility of performing malicious actions to damage the critical IT resources of a target organization.

Cyber Threat

Vulnerability

Zero-Day Attack

Exploit

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

There are 3 stages in achieving the intelligence called ...

unknown unknowns - known unknowns - known knowns

unknown unknowns - known knowns - known unknowns

known knowns - known unknowns - unknown unknowns

unknown unknowns - unknown knowns - known knowns

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Michael, a threat analyst at an organization named Tech Top, was asked to conduct a cyber-threat intelligence analysis. After obtaining information regarding threats, he has started analyzing the information and understanding the nature of the threats. What stage of the cyber-threat intelligence is Michael currently in?

Known unknowns

Unknown unknowns

Known knowns

Unknowns unknown

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?