Pre Test CTIA

Pre Test CTIA

Professional Development

10 Qs

quiz-placeholder

Similar activities

Microsoft 365 for Teachers

Microsoft 365 for Teachers

Professional Development

10 Qs

Web Technology

Web Technology

Professional Development

10 Qs

SEC+ Ch.8 Review Test

SEC+ Ch.8 Review Test

Professional Development

15 Qs

Ngobrolin-TI

Ngobrolin-TI

Professional Development

10 Qs

Office IT Management

Office IT Management

Professional Development

15 Qs

Openshift x Sonarqube

Openshift x Sonarqube

University - Professional Development

12 Qs

หลังการอบรมเชิงปฎิบัติการด้านความรู้เทคโนโลยีสารสนเทศฯ 2567

หลังการอบรมเชิงปฎิบัติการด้านความรู้เทคโนโลยีสารสนเทศฯ 2567

Professional Development

11 Qs

CEH Pre Assessment

CEH Pre Assessment

Professional Development

10 Qs

Pre Test CTIA

Pre Test CTIA

Assessment

Quiz

Computers

Professional Development

Practice Problem

Medium

Created by

Mohammad Ilahi

Used 12+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Threat intelligence lifecycle.

1) Collection

2) Analysis and Production

3) Planning and Direction

4) Processing and Exploitation

5) Dissemination and Integration

What is the correct sequence of steps involved in a threat intelligence lifecycle?

2), 4), 3), 1), 5)

3), 2), 1), 4), 5)

3), 1), 2), 4), 5)

3), 1), 4), 2), 5)

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Getting all the information from public source and any where that we can get in the internet is part of data collecting in

IMINT

HUMINT

SIGINT

OSINT

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Analyzed and interpreted information providing broader in-depth knowledge of the subject, that supports decision making and response actions. What kind of the definition above?

Information

Data

Operational Environment

Intelligence

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Individuals or Team employed by the government to penetrate and gain top-secret information and to damage information systems of other governments. What kind of the threat actor above?

Hacktivists

State-Sponsored Hackers

Organized Hackers

Insider Threat

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

In which of the following attacks does the attacker exploit vulnerabilities in a computer application before the software developer can release a patch for them?

Advanced persistent attack

Active online attack

Zero-day attack

Distributed network attack

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

During the process of threat intelligence analysis, John, a threat analyst, successfully extracted an indication of adversary’s information, such as information on specific indicators of compromise consumed SOC staff, and IR Teams. Identify the type of threat intelligence analysis is performed by John?

Tactical threat intelligence analysis

Operational threat intelligence analysis

Strategic threat intelligence analysis

Technical threat intelligence analysis

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

In which of the following attacks that focuses on stealing information from the victim machine without its user being aware of it. These attacks are generally targeted at large companies and Government networks and are slow in nature, so the effects on computer performance and internet connections are negligible. And exploit vulnerabilities in the applications running on a computer, operating system, and embedded systems.

Advanced persistent attack

Active online attack

Zero-day attack

Distributed network attack

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?