Search Header Logo

Cti Quiz

Authored by Tevfik Pehlivan

Mathematics

Professional Development

Used 2+ times

Cti Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of a Collection Management Framework (CMF)?

To store all collected threat data securely

To plan how data is collected, from where, and what type

To manage the budget for the CTI team

To train new analysts in threat detection

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes Priority Intelligence Requirements (PIRs)?

Optional requirements

Mission-critical requirements

Software-generated requirements

External threat requirements

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should be done when executives request attribution on a specific threat group without first-hand data?

Provide a generic report

Outsource the analysis

Clarify that the requirement cannot be confidently satisfied

Ignore the request

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During a recent financial breach investigation, you discover malware behavior similar to the Carbanak group. Which of the following scenarios is MOST likely based on this group's tactics?

Unauthorized SWIFT transfers to offshore accounts

ATM machines dispensing cash at predetermined times

Modification of database records to inflate account balances

Encryption of financial records for ransom

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following statements best describes the significance of Industroyer (also known as Crashoverride) malware in the context of cyber threats to critical infrastructure?

It was the first malware to specifically target smart home devices, highlighting vulnerabilities in IoT infrastructure.

It was the first known malware designed to disrupt electric grid operations, capable of causing power outages by attacking multiple industrial control protocols.

It was primarily a data exfiltration tool, focusing on stealing sensitive information from power companies without causing operational disruptions.

It was a cryptocurrency mining malware that specifically targeted the computing infrastructure of power plants, affecting their operational efficiency.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Your team needs to gather intelligence on a new threat actor targeting your industry. Which approach within the External Collection Management Framework would be MOST effective for prioritizing your collection efforts?

Focusing solely on technical indicators from previous attacks

Aligning collection requirements with your organization's strategic objectives

Maximizing the volume of data collected from all available sources

Relying primarily on open-source intelligence (OSINT) to reduce costs

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You're investigating a sophisticated supply chain attack. Using the Target-Centric Intelligence Analysis model, what should be your FIRST step?

Identify all potential adversaries capable of such an attack

Define the specific target of interest within the supply chain

Collect all available data related to supply chain attacks

Assess the impact on your organization's operations

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?