Quiz day 4

Quiz
•
Instructional Technology
•
Professional Development
•
Medium
bruno tevigo
Used 1+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Kim, an analyst, is looking for an intelligence-sharing platform to gather and share threat information from a variety of sources. He wants to use this information to develop security policies to enhance the overall security posture of his organization.Which of the following sharing platforms should be used by Kim?
Blueliv threat exchange network
OmniPeek
Cuckoo sandbox
PortDroid network analysis
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
SecurityTech Inc. is developing a TI plan where it can drive more advantages in less funds. In the process of selecting a TI platform, it wants to incorporate a feature that ranks elements such as intelligence sources, threat actors, attacks, and digital assets of the organization, so that it can put in more funds toward the resources which are critical for the organization’s security. Which of the following key features should SecurityTech Inc. consider in their TI plan for selecting the TI platform?
Scoring
Search
Open
Workflow
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An XYZ organization hired Mr. Andrews, a threat analyst. In order to identify the threats and mitigate the effect of such threats, Mr. Andrews was asked to perform threat modeling. During the process of threat modeling, he collected important information about the threat actor and characterized the analytic behavior of the adversary that includes technological details, goals, and motives that can be useful in building a strong countermeasure. What stage of the threat modeling is Mr. Andrews currently in
Threat profiling and attribution
System modeling
Threat ranking
Threat determination and identification
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Miley, an analyst, wants to reduce the amount of collected data and make the storing and sharing process easy. She uses filtering, tagging, and queuing technique to sort out the relevant and structured data from the large amounts of unstructured data. Which of the following technique was employed by Miley?
Convenience sampling
Sandboxing
Data visualization
Normalization
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Kathy wants to ensure that she shares threat intelligence containing sensitive information with the appropriate audience. Hence, she used traffic light protocol (TLP). Which TLP color would signify that information should be shared only within a particular community?
Red
Green
Amber
White
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
In which of the following attacks does the attacker exploit vulnerabilities in a computer application before the software developer can release a patch for them?
Advanced persistent attack
Active online attack
Zero-day attack
Distributed network attack
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
An analyst wants to disseminate the information effectively so that the consumers can acquire and benefit out of the intelligence. Which of the following criteria must an analyst consider in order to make the Intelligence must consist of good-quality content that provides the consumer an understanding of threats and their harmful consequences, which can help in developing a mitigation plan?
The right content
The right presentation
The right Time
The right order
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
[W0 Jan23] Quizizz for OW

Quiz
•
Professional Development
10 questions
Online collaboration tools

Quiz
•
Professional Development
10 questions
Cybersecurity Month Contest

Quiz
•
Professional Development
10 questions
Networking basics

Quiz
•
Professional Development
11 questions
Digital Literacy

Quiz
•
Professional Development
10 questions
CS Assessment Study Guide

Quiz
•
Professional Development
9 questions
Cyber Safe Session 2

Quiz
•
Professional Development
10 questions
Integration of ICT in Education

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade