Quiz day 4

Quiz day 4

Professional Development

10 Qs

quiz-placeholder

Similar activities

Pre-test: AI for Islamic

Pre-test: AI for Islamic

Professional Development

12 Qs

AI Quiz with Nazir

AI Quiz with Nazir

Professional Development

10 Qs

Cyber Security Awareness Training Quiz 2024

Cyber Security Awareness Training Quiz 2024

Professional Development

11 Qs

New Literacies and 21st Century Skills

New Literacies and 21st Century Skills

University - Professional Development

10 Qs

ETEII 4.0

ETEII 4.0

Professional Development

10 Qs

[W0 Jan23] Quizizz for OW

[W0 Jan23] Quizizz for OW

Professional Development

10 Qs

Cyber Safe Session 2

Cyber Safe Session 2

Professional Development

9 Qs

Garder's Theory on MI

Garder's Theory on MI

Professional Development

11 Qs

Quiz day 4

Quiz day 4

Assessment

Quiz

Instructional Technology

Professional Development

Medium

Created by

bruno tevigo

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Kim, an analyst, is looking for an intelligence-sharing platform to gather and share threat information from a variety of sources. He wants to use this information to develop security policies to enhance the overall security posture of his organization.Which of the following sharing platforms should be used by Kim?

Blueliv threat exchange network

OmniPeek

Cuckoo sandbox

PortDroid network analysis

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

SecurityTech Inc. is developing a TI plan where it can drive more advantages in less funds. In the process of selecting a TI platform, it wants to incorporate a feature that ranks elements such as intelligence sources, threat actors, attacks, and digital assets of the organization, so that it can put in more funds toward the resources which are critical for the organization’s security. Which of the following key features should SecurityTech Inc. consider in their TI plan for selecting the TI platform?

Scoring

Search

Open

Workflow

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An XYZ organization hired Mr. Andrews, a threat analyst. In order to identify the threats and mitigate the effect of such threats, Mr. Andrews was asked to perform threat modeling. During the process of threat modeling, he collected important information about the threat actor and characterized the analytic behavior of the adversary that includes technological details, goals, and motives that can be useful in building a strong countermeasure. What stage of the threat modeling is Mr. Andrews currently in

Threat profiling and attribution

System modeling

Threat ranking

Threat determination and identification

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Miley, an analyst, wants to reduce the amount of collected data and make the storing and sharing process easy. She uses filtering, tagging, and queuing technique to sort out the relevant and structured data from the large amounts of unstructured data. Which of the following technique was employed by Miley?

Convenience sampling

Sandboxing

Data visualization

Normalization

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Kathy wants to ensure that she shares threat intelligence containing sensitive information with the appropriate audience. Hence, she used traffic light protocol (TLP). Which TLP color would signify that information should be shared only within a particular community?

Red

Green

Amber

White

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In which of the following attacks does the attacker exploit vulnerabilities in a computer application before the software developer can release a patch for them?

Advanced persistent attack

Active online attack

Zero-day attack

Distributed network attack

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An analyst wants to disseminate the information effectively so that the consumers can acquire and benefit out of the intelligence. Which of the following criteria must an analyst consider in order to make the Intelligence must consist of good-quality content that provides the consumer an understanding of threats and their harmful consequences, which can help in developing a mitigation plan?

The right content

The right presentation

The right Time

The right order

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?