Pre Test CTIA

Pre Test CTIA

Professional Development

10 Qs

quiz-placeholder

Similar activities

CNS QUIZ

CNS QUIZ

Professional Development

10 Qs

Blockchain and Metaverse

Blockchain and Metaverse

University - Professional Development

10 Qs

SOF Day 2 Review

SOF Day 2 Review

Professional Development

11 Qs

CND Quiz Week 11

CND Quiz Week 11

Professional Development

10 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

Cybersecurity: Core Skills

Cybersecurity: Core Skills

Professional Development

13 Qs

Gordon's Review: Mod 2 RMF & CSF, Intro to Cybersecurity

Gordon's Review: Mod 2 RMF & CSF, Intro to Cybersecurity

Professional Development

12 Qs

Cybersecurity Concepts

Cybersecurity Concepts

Professional Development

10 Qs

Pre Test CTIA

Pre Test CTIA

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Mohammad Ilahi

Used 11+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Threat intelligence lifecycle.

1) Collection

2) Analysis and Production

3) Planning and Direction

4) Processing and Exploitation

5) Dissemination and Integration

What is the correct sequence of steps involved in a threat intelligence lifecycle?

2), 4), 3), 1), 5)

3), 2), 1), 4), 5)

3), 1), 2), 4), 5)

3), 1), 4), 2), 5)

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Getting all the information from public source and any where that we can get in the internet is part of data collecting in

IMINT

HUMINT

SIGINT

OSINT

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Analyzed and interpreted information providing broader in-depth knowledge of the subject, that supports decision making and response actions. What kind of the definition above?

Information

Data

Operational Environment

Intelligence

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Individuals or Team employed by the government to penetrate and gain top-secret information and to damage information systems of other governments. What kind of the threat actor above?

Hacktivists

State-Sponsored Hackers

Organized Hackers

Insider Threat

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

In which of the following attacks does the attacker exploit vulnerabilities in a computer application before the software developer can release a patch for them?

Advanced persistent attack

Active online attack

Zero-day attack

Distributed network attack

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

During the process of threat intelligence analysis, John, a threat analyst, successfully extracted an indication of adversary’s information, such as information on specific indicators of compromise consumed SOC staff, and IR Teams. Identify the type of threat intelligence analysis is performed by John?

Tactical threat intelligence analysis

Operational threat intelligence analysis

Strategic threat intelligence analysis

Technical threat intelligence analysis

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

In which of the following attacks that focuses on stealing information from the victim machine without its user being aware of it. These attacks are generally targeted at large companies and Government networks and are slow in nature, so the effects on computer performance and internet connections are negligible. And exploit vulnerabilities in the applications running on a computer, operating system, and embedded systems.

Advanced persistent attack

Active online attack

Zero-day attack

Distributed network attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?