
Detection and Response: Quiz 5
Authored by John Coder
Computers
Professional Development

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
14 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
1 min • 1 pt
During the Detection and Analysis Phase of the incident response lifecycle, security teams are notified of a possible incident and work to inve_________ and ver_________ the incident by collecting and analyzing data. As a reminder, ? refers to the prompt discovery of security events and ? involves the investigation and validation of alerts.
2.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Threat hunting is the proa___________ search for threats on a network. Security professionals use threat hunting to uncover malicious activity that was not identified by detection tools and as a way to do further analysis on detections. Threat hunting is also used to detect threats before they cause damage. For example, fileless malware is difficult for detection tools to identify. It’s a form of malware that uses sophisticated evasion techniques such as hiding in memory instead of using files or applications, allowing it to bypass traditional methods of detection like signature analysis. With threat hunting, the combination of active human analysis and technology is used to identify threats like fileless malware.
3.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Organizations can improve their detection capabilities by staying updated on the evolving threat landscape and understanding the relationship between their environment and malicious actors. One way to understand threats is by using threat intelligence, which is evi________-based threat information that provides context about existing or emerging threats.
4.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Threat intelligence can come from private or public sources like:
indu_________ reports: These often include details about attacker's tactics, techniques, and procedures (TTP).
government advisories: Similar to industry reports, government advisories include details about attackers' TTP.
threat data fe______: Threat data fe______ provide a stream of threat-related data that can be used to help protect against sophisticated attackers like advanced persistent threats (APTs). APTs are instances when a threat actor main________ unauthorized access to a system for an extended period of time. The data is usually a list of indicators like IP addresses, domains, and file hashes.
5.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Cyber deception involves techniques that deliberately deceive malicious actors with the goal of increasing detection and improving defensive strategies.
Honeypots are an example of an active cyber defense mechanism that uses deception technology. Honeypots are systems or resources that are created as dec________ vulnerable to attacks with the purpose of attracting potential intruders. For example, having a fake file labeled Client Credit Card Information - 2022 can be used to capture the activity of malicious actors by tricking them into accessing the file because it appears to be legitimate. Once a malicious actor tries to access this file, security teams are alerted.
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Indicators of comp___________ are observable evidence that suggests signs of a potential security incident. IoCs chart specific pieces of evidence that are associated with an attack, like a file name associated with a type of malware. You can think of an IoC as evidence that points to something that's already happened, like noticing that a valuable has been stolen from inside of a car.
7.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Indicators of at_______ (IoA) are the series of observed events that indicate a real-time incident. IoAs focus on identifying the behavioral evidence of an threat actor, including their methods and intentions.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
14 questions
Input, output and storage de
Quiz
•
8th Grade - Professio...
10 questions
Globe Google Workspace Intro
Quiz
•
Professional Development
10 questions
Hành vi tổ chức
Quiz
•
University - Professi...
10 questions
Azure Cloud computing
Quiz
•
Professional Development
13 questions
GRAND OPENING INTERNSHIP EXERCISE 2024
Quiz
•
Professional Development
10 questions
aws_workshop
Quiz
•
Professional Development
11 questions
Marvel Future Fight
Quiz
•
KG - Professional Dev...
10 questions
CLEAN WATER AND SANITATION
Quiz
•
10th Grade - Professi...
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Computers
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
12 questions
Mardi Gras Trivia
Quiz
•
Professional Development
7 questions
Copy of G5_U5_L14_22-23
Lesson
•
KG - Professional Dev...
12 questions
Unit 5: Puerto Rico W1
Quiz
•
Professional Development
42 questions
LOTE_SPN2 5WEEK2 Day 4 We They Actividad 3
Quiz
•
Professional Development
15 questions
Balance Equations Hangers
Quiz
•
Professional Development
31 questions
Servsafe Food Manager Practice Test 2021- Part 1
Quiz
•
9th Grade - Professio...