
Quiz Day 1 - CTIA - Konsep Cyber Threat Intelligence
Authored by Mohammad Ilahi
Computers
Professional Development
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Advanced persistent threat (APT) is ...
define as a type of network attack where attacker gains unauthorized access to a target network and remains there undetected for a long period of time.
huge network compromised systems used by attackers to perform denial-of-services attacks.
defined as the collection and analysis of information about threats and adversaries.
the clues/artifact/pieces of forensic data that is found on a network that indicates a potential intrusion or malicious activity.
2.
FILL IN THE BLANKS QUESTION
2 mins • 1 pt
... is a layer of online cyberspace that consists of web pages and content that are hidden and unindexed.
(a)
3.
FILL IN THE BLANKS QUESTION
2 mins • 1 pt
... is a deeper layer of online cyberspace and it is the subset of deep web and enables everyone to navigate anonymously without being traced.
(a)
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
A process that utilizes information to analyze and respond to emerging requirements of an organization is definition of.
Intelligence
Vulnerability
Exploit
Data
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
... is a possibility of performing malicious actions to damage the critical IT resources of a target organization.
Cyber Threat
Vulnerability
Zero-Day Attack
Exploit
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
There are 3 stages in achieving the intelligence called ...
unknown unknowns - known unknowns - known knowns
unknown unknowns - known knowns - known unknowns
known knowns - known unknowns - unknown unknowns
unknown unknowns - unknown knowns - known knowns
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Michael, a threat analyst at an organization named Tech Top, was asked to conduct a cyber-threat intelligence analysis. After obtaining information regarding threats, he has started analyzing the information and understanding the nature of the threats. What stage of the cyber-threat intelligence is Michael currently in?
Known unknowns
Unknown unknowns
Known knowns
Unknowns unknown
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?