CySA+ Study Guide Book: Threat Intelligence

Quiz
•
Professional Development
•
Professional Development
•
Hard
Robert Teney
FREE Resource
Student preview

20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following measures is not commonly used to assess threat intelligence?
Timeliness
Detail
Accuracy
Relevance
Answer explanation
"Detail" is not commonly used as a specific measure to assess threat intelligence. The other options—Timeliness, Accuracy, and Relevance—are critical factors in evaluating the quality and usefulness of threat intelligence. Timeliness refers to how current the information is, Accuracy indicates the correctness of the data, and Relevance assesses how applicable the intelligence is to the specific context or environment. While the level of detail can be important, it is not a standard measure like the others.
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Nandita has encountered an attacker who appears to be using a commonly available exploit package to attack her organization. The package seems to have been run with default configurations against her entire public-facing Internet presence from a single system. What type of threat actor is she most likely facing?
An APT
A hacktivist
A script kiddie
A nation-state actor
Answer explanation
Nandita is most likely facing a script kiddie. This type of threat actor typically uses readily available exploit packages and tools without a deep understanding of how they work, often running them with default configurations. The fact that the attack is against her organization's public-facing Internet presence from a single system indicates a less sophisticated approach, which aligns with the behavior of script kiddies. Advanced Persistent Threats (APTs) and nation-state actors usually employ more targeted and sophisticated methods, while hacktivists are motivated by political or social causes rather than opportunistic exploitation.
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following activities follows threat data analysis in the threat intelligence cycle?
Gathering feedback
Threat data collection
Threat data review
Threat intelligence dissemination
Answer explanation
Following threat data analysis in the threat intelligence cycle, the next activity is threat intelligence dissemination. This step involves sharing the analyzed threat intelligence with relevant stakeholders to inform them of potential threats and improve security measures. Gathering feedback typically occurs after dissemination to assess the utility of the intelligence shared, while threat data collection and threat data review are earlier stages in the cycle that precede analysis.
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Susan wants to start performing intelligence gathering. Which of the following options is frequently conducted in the requirements gathering stage?
Review of security breaches or compromises your organization has faced
Review of current vulnerability scans
Review of current data handling standards
Review of threat intelligence feeds for new threats
Answer explanation
In the requirements gathering stage of intelligence gathering, reviewing security breaches or compromises that the organization has previously faced is a crucial activity. This review helps identify vulnerabilities and areas needing improvement, informing the focus of future intelligence efforts. The other options—reviewing current vulnerability scans, current data handling standards, and threat intelligence feeds—are important but are typically addressed in later stages of the intelligence gathering process, such as analysis or operational planning.
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What organizations did the U.S. government help create to help share knowledge between organizations in specific verticals?
DHS
SANS
CERTs
ISACs
Answer explanation
The U.S. government helped create Information Sharing and Analysis Centers (ISACs) to facilitate knowledge sharing between organizations in specific verticals, such as finance, energy, and healthcare. ISACs provide a platform for members to share information about threats, vulnerabilities, and best practices. While the Department of Homeland Security (DHS) plays a role in cybersecurity efforts, and organizations like SANS and CERTs (Computer Emergency Response Teams) contribute to cybersecurity education and incident response, ISACs are specifically focused on collaboration within particular sectors.
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following threat actors typically has the greatest access to resources?
Nation-state actors
Organized crime
Hacktivists
Insider threats
Answer explanation
Nation-state actors typically have the greatest access to resources among the listed threat actors. They often have substantial funding, advanced technology, and highly skilled personnel, allowing them to conduct sophisticated cyber operations. Organized crime can also be well-resourced but generally lacks the same level of access and support as nation-states. Hacktivists usually operate with limited resources driven by ideological motives, while insider threats may have access to organizational resources but do not possess the broad capabilities of nation-state actors.
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Organizations like Anonymous, which target governments and businesses for political reasons, are examples of what type of threat actor?
Hacktivists
Military assets
Nation-state actors
Organized crime
Answer explanation
Organizations like Anonymous are examples of hacktivists. Hacktivists engage in cyber activities motivated by political or social causes, often targeting governments and businesses to promote their agenda. They typically operate as loosely organized groups and use various online tactics to raise awareness or protest against perceived injustices. Military assets refer to state-sponsored operations, while nation-state actors engage in more comprehensive and strategic cyber operations for national interests. Organized crime focuses primarily on financial gain rather than political motives.
Create a free account and access millions of resources
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade