Indicators of Compromise and Threat Intelligence

Indicators of Compromise and Threat Intelligence

Assessment

Interactive Video

Created by

Sophia Harris

Computers, Professional Development, Science

10th - 12th Grade

Hard

10:34

The video tutorial by Toby from Oine Security covers the basics of threat feeds and threat intelligence, explaining how they help in identifying indicators of compromise (IOCs). It explores tools like Alien Vault and Exploit Database, highlighting their roles in storing and sharing threat data. The tutorial also introduces the Google Hacking Database for advanced search techniques. Key takeaways include understanding the importance of threat intelligence in cybersecurity and familiarizing oneself with various databases and tools to stay updated on the latest threats.

Read more

10 questions

Show all answers

1.

MULTIPLE CHOICE

30 sec • 1 pt

What is the primary purpose of threat feeds?

2.

MULTIPLE CHOICE

30 sec • 1 pt

Which of the following is an indicator of compromise (IOC)?

3.

MULTIPLE CHOICE

30 sec • 1 pt

What is Alien Vault primarily used for?

4.

MULTIPLE CHOICE

30 sec • 1 pt

Which of the following is NOT an indicator of compromise found on Alien Vault?

5.

MULTIPLE CHOICE

30 sec • 1 pt

What type of information can you find on Exploit Database?

6.

MULTIPLE CHOICE

30 sec • 1 pt

Which of the following is NOT a filter option in Exploit Database?

7.

MULTIPLE CHOICE

30 sec • 1 pt

What is the purpose of Google's Hacking Database (GHDB)?

8.

MULTIPLE CHOICE

30 sec • 1 pt

Which search expression can be used to find files containing passwords in GHDB?

9.

MULTIPLE CHOICE

30 sec • 1 pt

What is unique about Exploit Database compared to other exploit information sites?

10.

MULTIPLE CHOICE

30 sec • 1 pt

Which of the following is NOT a source of threat intelligence feeds?

Explore all questions with a free account

or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?