Threat intelligence lifecycle.
1) Collection
2) Analysis and Production
3) Planning and Direction
4) Processing and Exploitation
5) Dissemination and Integration
What is the correct sequence of steps involved in a threat intelligence lifecycle?
Pre Test CTIA
Quiz
•
Computers
•
Professional Development
•
Medium
Mohammad Ilahi
Used 11+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Threat intelligence lifecycle.
1) Collection
2) Analysis and Production
3) Planning and Direction
4) Processing and Exploitation
5) Dissemination and Integration
What is the correct sequence of steps involved in a threat intelligence lifecycle?
2), 4), 3), 1), 5)
3), 2), 1), 4), 5)
3), 1), 2), 4), 5)
3), 1), 4), 2), 5)
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Getting all the information from public source and any where that we can get in the internet is part of data collecting in
IMINT
HUMINT
SIGINT
OSINT
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Analyzed and interpreted information providing broader in-depth knowledge of the subject, that supports decision making and response actions. What kind of the definition above?
Information
Data
Operational Environment
Intelligence
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Individuals or Team employed by the government to penetrate and gain top-secret information and to damage information systems of other governments. What kind of the threat actor above?
Hacktivists
State-Sponsored Hackers
Organized Hackers
Insider Threat
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
In which of the following attacks does the attacker exploit vulnerabilities in a computer application before the software developer can release a patch for them?
Advanced persistent attack
Active online attack
Zero-day attack
Distributed network attack
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
During the process of threat intelligence analysis, John, a threat analyst, successfully extracted an indication of adversary’s information, such as information on specific indicators of compromise consumed SOC staff, and IR Teams. Identify the type of threat intelligence analysis is performed by John?
Tactical threat intelligence analysis
Operational threat intelligence analysis
Strategic threat intelligence analysis
Technical threat intelligence analysis
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
In which of the following attacks that focuses on stealing information from the victim machine without its user being aware of it. These attacks are generally targeted at large companies and Government networks and are slow in nature, so the effects on computer performance and internet connections are negligible. And exploit vulnerabilities in the applications running on a computer, operating system, and embedded systems.
Advanced persistent attack
Active online attack
Zero-day attack
Distributed network attack
10 questions
AI and its Risk
Quiz
•
Professional Development
15 questions
R&D Days
Quiz
•
Professional Development
13 questions
Explore 2022 - NSX-T 3.2 ATP
Quiz
•
Professional Development
15 questions
SEC+ Ch.7 Review Test
Quiz
•
Professional Development
15 questions
Security+ Study Guide-07 Protecting Against Advanced Attacks
Quiz
•
Professional Development
15 questions
Sec+ Quiz - 1
Quiz
•
Professional Development
12 questions
Threats and Risks
Quiz
•
Professional Development
10 questions
Domain 1 - Threat Actors, Vectors, and Intelligence Sources
Quiz
•
Professional Development
15 questions
Multiplication Facts
Quiz
•
4th Grade
20 questions
Math Review - Grade 6
Quiz
•
6th Grade
20 questions
math review
Quiz
•
4th Grade
5 questions
capitalization in sentences
Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance
Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions
Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines
Quiz
•
Professional Development
12 questions
Dividing Fractions
Quiz
•
6th Grade