CTI from zero to hero

CTI from zero to hero

1st - 3rd Grade

15 Qs

quiz-placeholder

Similar activities

Système d'exploitation

Système d'exploitation

1st - 5th Grade

13 Qs

life group

life group

3rd - 6th Grade

10 Qs

NGAF_Training Quiz

NGAF_Training Quiz

KG - Professional Development

10 Qs

CRM B2C Начало работы\CTI-панель (2 день)

CRM B2C Начало работы\CTI-панель (2 день)

1st Grade

16 Qs

Wordly Wise 3000 Book 4, Lesson 7

Wordly Wise 3000 Book 4, Lesson 7

KG - Professional Development

19 Qs

SCB Nexus Daily Quiz - (Updated Mar 23rd)

SCB Nexus Daily Quiz - (Updated Mar 23rd)

1st - 2nd Grade

20 Qs

La valeur ajoutée

La valeur ajoutée

1st - 5th Grade

11 Qs

Five Nights at Freddys

Five Nights at Freddys

KG - Professional Development

10 Qs

CTI from zero to hero

CTI from zero to hero

Assessment

Quiz

Other

1st - 3rd Grade

Hard

Created by

Nee No

Used 18+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Let's test your ability to find the right answer

1+1=3

x3x3=x9x^3\cdot x^3=x^9

false

CTI=Cyber Threat Intelligence

2.

MULTIPLE CHOICE QUESTION

20 sec • Ungraded

Which is the best background for a CTI talk?

Media Image
Media Image
Media Image
Media Image

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What makes something a threat?

Capability, Opportunity and Intent

Capability, Infrastructure and Opportunity

Loss of Confidentiality, Availability and Integrity

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Is there any platform or tool we can get to create threat intelligence?

A decompiler

A Threat Intelligence Platform

A Malware Information Sharing Platform

No, there isn't

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which are the five phases of the Cyber Threat Intelligence Cycle?

Planning & Direction, collection&processing, exploitation& analysis, dissemination&feedback

collection&processing, exploitation& analysis, dissemination&feedback

Planning & Direction, collection, processing&exploitation, analysis&production, dissemination&feedback

Planning & Direction, collection&processing, exploitation, analysis&production, dissemination&feedback

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which are the core features of an intrusion event

Adversary, TTPs, Capabilities, Victim

Adversary, Infrastructure, Capabilities, Victim

Adversary, motivation, intent, opportunity

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

If a RAT running on a compromised host is discovered, in which phase of the killchain should we report this event?

Reconnaissance

Installation

C2

Action on Objectives

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?