

Indicators of Compromise and Threat Intelligence
Interactive Video
•
Computers, Professional Development, Science
•
10th - 12th Grade
•
Practice Problem
•
Hard
Sophia Harris
FREE Resource
Read more
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary purpose of threat feeds?
To monitor network traffic
To protect personal data
To create new malware
To share threat intelligence
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an indicator of compromise (IOC)?
A new software update
An unknown IP address on your network
A scheduled system reboot
A user login
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is Alien Vault primarily used for?
Monitoring social media
Sharing threat intelligence
Storing personal data
Creating new exploits
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT an indicator of compromise found on Alien Vault?
MAC address
Hostname
IP address
File hash
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of information can you find on Exploit Database?
Personal user data
Social media trends
Weather forecasts
System vulnerabilities and exploits
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a filter option in Exploit Database?
Heap overflow
Evil twin
Code injection
Authentication bypass
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of Google's Hacking Database (GHDB)?
To perform fine-tuned searches for sensitive information
To monitor social media activity
To store personal photos
To create new malware
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?