
Indicators of Compromise and Threat Intelligence

Interactive Video
•
Computers, Professional Development, Science
•
10th - 12th Grade
•
Hard

Sophia Harris
FREE Resource
Read more
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary purpose of threat feeds?
To monitor network traffic
To protect personal data
To create new malware
To share threat intelligence
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an indicator of compromise (IOC)?
A new software update
An unknown IP address on your network
A scheduled system reboot
A user login
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is Alien Vault primarily used for?
Monitoring social media
Sharing threat intelligence
Storing personal data
Creating new exploits
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT an indicator of compromise found on Alien Vault?
MAC address
Hostname
IP address
File hash
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of information can you find on Exploit Database?
Personal user data
Social media trends
Weather forecasts
System vulnerabilities and exploits
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a filter option in Exploit Database?
Heap overflow
Evil twin
Code injection
Authentication bypass
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of Google's Hacking Database (GHDB)?
To perform fine-tuned searches for sensitive information
To monitor social media activity
To store personal photos
To create new malware
Create a free account and access millions of resources
Similar Resources on Wayground
11 questions
Technology and Crime: A Double-Edged Sword

Interactive video
•
10th - 12th Grade
11 questions
Understanding Threat Actors in Cybersecurity

Interactive video
•
10th - 12th Grade
11 questions
Understanding Microrefugia and Climate Change

Interactive video
•
9th - 12th Grade
11 questions
Cloud Security Vulnerabilities and Risks

Interactive video
•
10th Grade - University
6 questions
These Crocs Were Made for Chewing

Interactive video
•
11th Grade - University
6 questions
How hackers could use smart home devices to access personal data

Interactive video
•
11th Grade - University
6 questions
Iranian hackers target corporate VPN servers

Interactive video
•
11th Grade - University
11 questions
DNS Security and URL Hijacking

Interactive video
•
10th - 12th Grade
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
10 questions
Proper Keyboarding Techniques

Interactive video
•
6th - 10th Grade
10 questions
Understanding Computers: Hardware, Software, and Operating Systems

Interactive video
•
7th - 12th Grade
29 questions
AP CSP Unit 2 Review (Code.org)

Quiz
•
10th - 12th Grade