Quiz Day 1 - CTIA - Konsep Cyber Threat Intelligence

Quiz Day 1 - CTIA - Konsep Cyber Threat Intelligence

Professional Development

20 Qs

quiz-placeholder

Similar activities

Security SY0701

Security SY0701

Professional Development

20 Qs

R&D Days

R&D Days

Professional Development

15 Qs

แบบทดสอบ Ai and Machine Learning

แบบทดสอบ Ai and Machine Learning

Professional Development

20 Qs

Video Games

Video Games

2nd Grade - Professional Development

15 Qs

Lesson 5.2 Conducting an InfoSec Risk Assessment

Lesson 5.2 Conducting an InfoSec Risk Assessment

Professional Development

15 Qs

Digi Walk

Digi Walk

Professional Development

20 Qs

Machine Learning 101

Machine Learning 101

University - Professional Development

20 Qs

Security and Domain

Security and Domain

Professional Development

20 Qs

Quiz Day 1 - CTIA - Konsep Cyber Threat Intelligence

Quiz Day 1 - CTIA - Konsep Cyber Threat Intelligence

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Mohammad Ilahi

Used 5+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Advanced persistent threat (APT) is ...

define as a type of network attack where attacker gains unauthorized access to a target network and remains there undetected for a long period of time.

huge network compromised systems used by attackers to perform denial-of-services attacks.

defined as the collection and analysis of information about threats and adversaries.

the clues/artifact/pieces of forensic data that is found on a network that indicates a potential intrusion or malicious activity.

2.

FILL IN THE BLANK QUESTION

2 mins • 1 pt

... is a layer of online cyberspace that consists of web pages and content that are hidden and unindexed.

3.

FILL IN THE BLANK QUESTION

2 mins • 1 pt

... is a deeper layer of online cyberspace and it is the subset of deep web and enables everyone to navigate anonymously without being traced.

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A process that utilizes information to analyze and respond to emerging requirements of an organization is definition of.

Intelligence

Vulnerability

Exploit

Data

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

... is a possibility of performing malicious actions to damage the critical IT resources of a target organization.

Cyber Threat

Vulnerability

Zero-Day Attack

Exploit

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

There are 3 stages in achieving the intelligence called ...

unknown unknowns - known unknowns - known knowns

unknown unknowns - known knowns - known unknowns

known knowns - known unknowns - unknown unknowns

unknown unknowns - unknown knowns - known knowns

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Michael, a threat analyst at an organization named Tech Top, was asked to conduct a cyber-threat intelligence analysis. After obtaining information regarding threats, he has started analyzing the information and understanding the nature of the threats. What stage of the cyber-threat intelligence is Michael currently in?

Known unknowns

Unknown unknowns

Known knowns

Unknowns unknown

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?