Search Header Logo

Threat Intel

Authored by Jason Webb

Instructional Technology

University

Used 2+ times

Threat Intel
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following OSINT sites might you investigate a malicious domain?

Pastebin

URLScan

Shodan

Spokeo

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is "collecting and analyzing information about emerging or existing threats"?

Threat Lifecycle

Threat Modeling

Cyber Threat Intelligence

Incident Response

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following steps are part of the Threat Intel Lifecycle? (Select all that apply)

Eradication

Dissemination

Analysis

Collection

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  • What tool allows you to discover who registered a certain domain and when?

whoami

Fingerprint

DIG

WHOIS

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  • How to find out if your credentials have been breached? (Select the best answer)

haveibeenpwned

breachlabs

darkweb marketplaces

VirusTotal

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Select all possible IOC types:

failed login

IP address

sender email

hash

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How would you search and exact phrase in Google?

Curly Brackets {}

Square Brackets []

Double Quotations ""

The "I'm Feeling Lucky" Button

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?