Search Header Logo

Quiz Day 1 - CTIA - Konsep Cyber Threat Intelligence

Authored by Mohammad Ilahi

Computers

Professional Development

Used 5+ times

Quiz Day 1 - CTIA - Konsep Cyber Threat Intelligence
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Advanced persistent threat (APT) is ...

define as a type of network attack where attacker gains unauthorized access to a target network and remains there undetected for a long period of time.

huge network compromised systems used by attackers to perform denial-of-services attacks.

defined as the collection and analysis of information about threats and adversaries.

the clues/artifact/pieces of forensic data that is found on a network that indicates a potential intrusion or malicious activity.

2.

FILL IN THE BLANKS QUESTION

2 mins • 1 pt

... is a layer of online cyberspace that consists of web pages and content that are hidden and unindexed.

(a)  

3.

FILL IN THE BLANKS QUESTION

2 mins • 1 pt

... is a deeper layer of online cyberspace and it is the subset of deep web and enables everyone to navigate anonymously without being traced.

(a)  

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A process that utilizes information to analyze and respond to emerging requirements of an organization is definition of.

Intelligence

Vulnerability

Exploit

Data

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

... is a possibility of performing malicious actions to damage the critical IT resources of a target organization.

Cyber Threat

Vulnerability

Zero-Day Attack

Exploit

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

There are 3 stages in achieving the intelligence called ...

unknown unknowns - known unknowns - known knowns

unknown unknowns - known knowns - known unknowns

known knowns - known unknowns - unknown unknowns

unknown unknowns - unknown knowns - known knowns

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Michael, a threat analyst at an organization named Tech Top, was asked to conduct a cyber-threat intelligence analysis. After obtaining information regarding threats, he has started analyzing the information and understanding the nature of the threats. What stage of the cyber-threat intelligence is Michael currently in?

Known unknowns

Unknown unknowns

Known knowns

Unknowns unknown

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?