Quiz day 4

Quiz day 4

Professional Development

10 Qs

quiz-placeholder

Similar activities

Fundamentos Clase 3 - Azure DevOps

Fundamentos Clase 3 - Azure DevOps

Professional Development

10 Qs

ICT Matters

ICT Matters

4th Grade - Professional Development

10 Qs

Who run the test ?

Who run the test ?

Professional Development

10 Qs

D2NHS

D2NHS

Professional Development

10 Qs

Quiz 9.1

Quiz 9.1

Professional Development

14 Qs

ISSP Quiz

ISSP Quiz

Professional Development

10 Qs

Star Wars Ships and shuttles

Star Wars Ships and shuttles

3rd Grade - Professional Development

13 Qs

Jets

Jets

1st Grade - Professional Development

13 Qs

Quiz day 4

Quiz day 4

Assessment

Quiz

Instructional Technology

Professional Development

Medium

Created by

bruno tevigo

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Kim, an analyst, is looking for an intelligence-sharing platform to gather and share threat information from a variety of sources. He wants to use this information to develop security policies to enhance the overall security posture of his organization.Which of the following sharing platforms should be used by Kim?

Blueliv threat exchange network

OmniPeek

Cuckoo sandbox

PortDroid network analysis

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

SecurityTech Inc. is developing a TI plan where it can drive more advantages in less funds. In the process of selecting a TI platform, it wants to incorporate a feature that ranks elements such as intelligence sources, threat actors, attacks, and digital assets of the organization, so that it can put in more funds toward the resources which are critical for the organization’s security. Which of the following key features should SecurityTech Inc. consider in their TI plan for selecting the TI platform?

Scoring

Search

Open

Workflow

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An XYZ organization hired Mr. Andrews, a threat analyst. In order to identify the threats and mitigate the effect of such threats, Mr. Andrews was asked to perform threat modeling. During the process of threat modeling, he collected important information about the threat actor and characterized the analytic behavior of the adversary that includes technological details, goals, and motives that can be useful in building a strong countermeasure. What stage of the threat modeling is Mr. Andrews currently in

Threat profiling and attribution

System modeling

Threat ranking

Threat determination and identification

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Miley, an analyst, wants to reduce the amount of collected data and make the storing and sharing process easy. She uses filtering, tagging, and queuing technique to sort out the relevant and structured data from the large amounts of unstructured data. Which of the following technique was employed by Miley?

Convenience sampling

Sandboxing

Data visualization

Normalization

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Kathy wants to ensure that she shares threat intelligence containing sensitive information with the appropriate audience. Hence, she used traffic light protocol (TLP). Which TLP color would signify that information should be shared only within a particular community?

Red

Green

Amber

White

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In which of the following attacks does the attacker exploit vulnerabilities in a computer application before the software developer can release a patch for them?

Advanced persistent attack

Active online attack

Zero-day attack

Distributed network attack

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An analyst wants to disseminate the information effectively so that the consumers can acquire and benefit out of the intelligence. Which of the following criteria must an analyst consider in order to make the Intelligence must consist of good-quality content that provides the consumer an understanding of threats and their harmful consequences, which can help in developing a mitigation plan?

The right content

The right presentation

The right Time

The right order

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?