
Day 2 Quiz - Exploring Threat Intelligence & Threat Hunting ....
Authored by Robert Teney
Professional Development
Professional Development
Objective 1 covered
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
17 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 1.4/Day 2 -
A security analyst is evaluating the motivations and resources behind a prolonged and sophisticated attack on the organization’s network. The attack seems to be well-funded, persistent, and targeted specifically at stealing sensitive data. Which type of threat actor is most likely behind this attack?
Script kiddie
Insider threat
Organized crime
Advanced persistent threat (APT)
Answer explanation
The characteristics described in the scenario—prolonged, sophisticated, well-funded, and targeted—are indicative of an Advanced Persistent Threat (APT). APTs are typically associated with nation-states or other highly organized entities that have significant resources and motivation to achieve specific objectives, often involving stealing sensitive data over an extended period. Script kiddies lack the sophistication and resources, while insider threats may not have the same level of persistence or targeting. Organized crime can be sophisticated, but their primary motivation is usually financial gain, and they may not exhibit the same persistence or specific targeting as APTs.
Tags
Objective 1.4
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 1.4/Day 2 -
An organization is concerned about employees unintentionally exposing sensitive information through phishing attacks. Which type of insider threat does this scenario best describe?
Unintentional insider threat
Intentional insider threat
Script kiddie
Hacktivist
Answer explanation
The scenario describes employees who might unintentionally expose sensitive information, which aligns with the concept of an Unintentional insider threat. These are individuals within the organization who do not intend to cause harm but may do so accidentally, often through actions like falling victim to phishing attacks. An Intentional insider threat would involve someone deliberately acting against the organization's interests. Script kiddies and hacktivists are external threats rather than insiders.
Tags
Objective 1.4
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 1.4/Day 2 -
Which threat actor is most likely to engage in politically motivated attacks, often seeking to disrupt services or deface websites to spread a particular message?
Advanced persistent threat (APT)
Nation-state
Hacktivist
Supply chain attacker
Answer explanation
Hacktivists are threat actors who engage in politically or socially motivated attacks. They often aim to disrupt services, deface websites, or spread a particular message related to their cause. APTs and nation-states may also engage in sophisticated attacks, but their motivations are usually more focused on espionage, data theft, or national security. A supply chain attacker targets vulnerabilities within the supply chain, typically for financial gain or espionage, rather than spreading a message.
Tags
Objective 1.4
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 1.4/Day 2 -
A security analyst receives a threat intelligence report that contains data about a new malware variant. The report was published six months ago, and the malware's characteristics have likely evolved since then. Which confidence level aspect is most impacted by the age of the report?
Relevancy
Timeliness
Accuracy
Collection method
Answer explanation
The timeliness of threat intelligence refers to how current the information is. In this scenario, the six-month-old report may no longer be timely, as the malware's characteristics could have changed. This impacts the usefulness of the information in making informed security decisions. While relevancy and accuracy are also important, the primary concern here is the information's timeliness, as outdated intelligence may not accurately reflect current threats. Collection method relates to how the data was gathered, not its timeliness.
Tags
Objective 1.4
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 1.4/Day 2 -
Which of the following is an example of a closed-source threat intelligence collection method?
Government bulletins
Paid feeds
Social media
Deep/dark web
Answer explanation
Paid feeds are an example of a closed-source threat intelligence collection method, where organizations pay for access to curated and proprietary threat intelligence data. This contrasts with open-source methods like government bulletins, social media, and deep/dark web monitoring, where information is publicly accessible or gathered from open sources.
Tags
Objective 1.4
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 1.4/Day 2 -
During threat hunting, an analyst is reviewing information from forums and blogs to identify potential indicators of compromise (IOCs) related to a recent vulnerability. Which collection method is the analyst primarily using?
Closed source
Government bulletins
Open source
Internal sources
Answer explanation
The analyst is using open source collection methods, which include gathering information from publicly accessible platforms like forums and blogs. These sources provide valuable insights into emerging threats and indicators of compromise (IOCs). Closed source refers to paid or proprietary data, while government bulletins are a specific type of open-source intelligence, and internal sources are data generated within the organization.
Tags
Objective 1.4
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 1.4/Day 2 -
An organization is implementing a threat intelligence sharing program to improve its security posture. How can sharing threat intelligence specifically enhance the organization's incident response capabilities?
By reducing the need for vulnerability assessments
By providing timely information on emerging threats
By eliminating the need for security engineering efforts
By ensuring compliance with legal and regulatory requirements
Answer explanation
Sharing threat intelligence can significantly enhance an organization's incident response capabilities by providing timely information on emerging threats. This allows the incident response team to proactively identify and mitigate potential threats before they can impact the organization. While vulnerability assessments and security engineering are also important, the primary benefit here is the timely and relevant information that aids in responding to incidents quickly and effectively. Compliance with legal and regulatory requirements is a broader consideration and not directly tied to the specific enhancement of incident response through threat intelligence sharing.
Tags
Objective 1.4
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?