
Chapter 7: Cyber Attribution
Authored by N M
Computers
University
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the goal of cyber attribution?
To hide the attackers' identity
To gain a complete picture of the attack
To promote cyber attacks
To ignore cyber attacks
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the challenges of cyber attribution?
Unlimited jurisdictional power
Lack of resources & expertise
Abundance of resources & expertise
Easy identification of intruders
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a cyber attribution technique?
Analyzing metadata connected to the attack
Ignoring metadata
Avoiding forensic investigation
Not examining tactics and procedures
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an enabler for public attribution?
Incident Severity
Lack of intelligence
Minimal attribution information
Geopolitical Situation
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why do businesses need cyber attributions?
To have serious consequences
To promote cyber attacks
To conduct investigations
To hide cyber attacks
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the key indicators to enable attribution?
Only Intent and Indicators from external sources
Tradecraft, Infrastructure, Malware, Intent, and Indicators from external sources
Only Tradecraft and Infrastructure
Only Malware and Intent
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the best practices for attribution?
Ignoring human error
Avoiding collaboration and information sharing
Looking for machine error
Rigorous analytic tradecraft
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?