CTI from zero to hero

CTI from zero to hero

1st - 3rd Grade

15 Qs

quiz-placeholder

Similar activities

First aid

First aid

3rd Grade

10 Qs

Error in Thinking

Error in Thinking

1st - 2nd Grade

17 Qs

Le CPC

Le CPC

1st - 3rd Grade

10 Qs

CRM B2C Начало работы\CTI-панель (2 день)

CRM B2C Начало работы\CTI-панель (2 день)

1st Grade

16 Qs

TRATEGIC ALLIANCES AND NETWORKS

TRATEGIC ALLIANCES AND NETWORKS

KG - University

10 Qs

Informatique Niv1

Informatique Niv1

1st - 12th Grade

20 Qs

Daily Quiz - Day 4 (CRM)

Daily Quiz - Day 4 (CRM)

1st - 3rd Grade

20 Qs

SCB Nexus Daily Quiz - (Updated Mar 23rd)

SCB Nexus Daily Quiz - (Updated Mar 23rd)

1st - 2nd Grade

20 Qs

CTI from zero to hero

CTI from zero to hero

Assessment

Quiz

Other

1st - 3rd Grade

Hard

Created by

Nee No

Used 18+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Let's test your ability to find the right answer

1+1=3

x3x3=x9x^3\cdot x^3=x^9

false

CTI=Cyber Threat Intelligence

2.

MULTIPLE CHOICE QUESTION

20 sec • Ungraded

Which is the best background for a CTI talk?

Media Image
Media Image
Media Image
Media Image

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What makes something a threat?

Capability, Opportunity and Intent

Capability, Infrastructure and Opportunity

Loss of Confidentiality, Availability and Integrity

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Is there any platform or tool we can get to create threat intelligence?

A decompiler

A Threat Intelligence Platform

A Malware Information Sharing Platform

No, there isn't

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which are the five phases of the Cyber Threat Intelligence Cycle?

Planning & Direction, collection&processing, exploitation& analysis, dissemination&feedback

collection&processing, exploitation& analysis, dissemination&feedback

Planning & Direction, collection, processing&exploitation, analysis&production, dissemination&feedback

Planning & Direction, collection&processing, exploitation, analysis&production, dissemination&feedback

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which are the core features of an intrusion event

Adversary, TTPs, Capabilities, Victim

Adversary, Infrastructure, Capabilities, Victim

Adversary, motivation, intent, opportunity

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

If a RAT running on a compromised host is discovered, in which phase of the killchain should we report this event?

Reconnaissance

Installation

C2

Action on Objectives

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?