
Cti Quiz
Authored by Tevfik Pehlivan
Mathematics
Professional Development
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
24 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the role of a Collection Management Framework (CMF)?
To store all collected threat data securely
To plan how data is collected, from where, and what type
To manage the budget for the CTI team
To train new analysts in threat detection
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes Priority Intelligence Requirements (PIRs)?
Optional requirements
Mission-critical requirements
Software-generated requirements
External threat requirements
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What should be done when executives request attribution on a specific threat group without first-hand data?
Provide a generic report
Outsource the analysis
Clarify that the requirement cannot be confidently satisfied
Ignore the request
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
During a recent financial breach investigation, you discover malware behavior similar to the Carbanak group. Which of the following scenarios is MOST likely based on this group's tactics?
Unauthorized SWIFT transfers to offshore accounts
ATM machines dispensing cash at predetermined times
Modification of database records to inflate account balances
Encryption of financial records for ransom
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following statements best describes the significance of Industroyer (also known as Crashoverride) malware in the context of cyber threats to critical infrastructure?
It was the first malware to specifically target smart home devices, highlighting vulnerabilities in IoT infrastructure.
It was the first known malware designed to disrupt electric grid operations, capable of causing power outages by attacking multiple industrial control protocols.
It was primarily a data exfiltration tool, focusing on stealing sensitive information from power companies without causing operational disruptions.
It was a cryptocurrency mining malware that specifically targeted the computing infrastructure of power plants, affecting their operational efficiency.
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Your team needs to gather intelligence on a new threat actor targeting your industry. Which approach within the External Collection Management Framework would be MOST effective for prioritizing your collection efforts?
Focusing solely on technical indicators from previous attacks
Aligning collection requirements with your organization's strategic objectives
Maximizing the volume of data collected from all available sources
Relying primarily on open-source intelligence (OSINT) to reduce costs
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You're investigating a sophisticated supply chain attack. Using the Target-Centric Intelligence Analysis model, what should be your FIRST step?
Identify all potential adversaries capable of such an attack
Define the specific target of interest within the supply chain
Collect all available data related to supply chain attacks
Assess the impact on your organization's operations
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?