Quiz Day 1 - CTIA - Konsep Cyber Threat Intelligence

Quiz Day 1 - CTIA - Konsep Cyber Threat Intelligence

Professional Development

20 Qs

quiz-placeholder

Similar activities

SyO. Introducción a los Sistemas

SyO. Introducción a los Sistemas

Professional Development

17 Qs

Nintendo Wii

Nintendo Wii

3rd Grade - Professional Development

20 Qs

Microsoft Excel

Microsoft Excel

KG - Professional Development

20 Qs

Datatypes and Flowcontrol

Datatypes and Flowcontrol

Professional Development

15 Qs

SEGURETAT DIGITAL ÀREA 1 CDD (B1)

SEGURETAT DIGITAL ÀREA 1 CDD (B1)

Professional Development

20 Qs

UF0511 Hojas de cálculo.

UF0511 Hojas de cálculo.

Professional Development

20 Qs

Quiz Evaluasi 1 Mapel DPJK

Quiz Evaluasi 1 Mapel DPJK

Professional Development

15 Qs

DI (EM24) - Diseño de Perfiles (T5)

DI (EM24) - Diseño de Perfiles (T5)

University - Professional Development

20 Qs

Quiz Day 1 - CTIA - Konsep Cyber Threat Intelligence

Quiz Day 1 - CTIA - Konsep Cyber Threat Intelligence

Assessment

Quiz

Computers

Professional Development

Practice Problem

Medium

Created by

Mohammad Ilahi

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Advanced persistent threat (APT) is ...

define as a type of network attack where attacker gains unauthorized access to a target network and remains there undetected for a long period of time.

huge network compromised systems used by attackers to perform denial-of-services attacks.

defined as the collection and analysis of information about threats and adversaries.

the clues/artifact/pieces of forensic data that is found on a network that indicates a potential intrusion or malicious activity.

2.

FILL IN THE BLANK QUESTION

2 mins • 1 pt

... is a layer of online cyberspace that consists of web pages and content that are hidden and unindexed.

3.

FILL IN THE BLANK QUESTION

2 mins • 1 pt

... is a deeper layer of online cyberspace and it is the subset of deep web and enables everyone to navigate anonymously without being traced.

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A process that utilizes information to analyze and respond to emerging requirements of an organization is definition of.

Intelligence

Vulnerability

Exploit

Data

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

... is a possibility of performing malicious actions to damage the critical IT resources of a target organization.

Cyber Threat

Vulnerability

Zero-Day Attack

Exploit

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

There are 3 stages in achieving the intelligence called ...

unknown unknowns - known unknowns - known knowns

unknown unknowns - known knowns - known unknowns

known knowns - known unknowns - unknown unknowns

unknown unknowns - unknown knowns - known knowns

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Michael, a threat analyst at an organization named Tech Top, was asked to conduct a cyber-threat intelligence analysis. After obtaining information regarding threats, he has started analyzing the information and understanding the nature of the threats. What stage of the cyber-threat intelligence is Michael currently in?

Known unknowns

Unknown unknowns

Known knowns

Unknowns unknown

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?