Search Header Logo

CK Cyber 2 - LO1.2.A

Authored by Kari Cobb

Information Technology (IT)

10th Grade

Used 1+ times

CK Cyber 2 - LO1.2.A
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of Cyber Threat Intelligence (CTI)?

To create new software applications

To understand adversaries’ motives, targets, and attack behaviors

To design network architectures

To develop marketing strategies

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of intelligence is gathered from publicly available information sources on the open internet?

Human Intelligence (HUMINT)

Signals Intelligence (SIGINT)

Open Source Intelligence (OSINT)

Geospatial Intelligence (GEOINT)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why do organizations prioritize CTI that focuses on their industry?

Because it is cheaper to obtain

Because adversaries develop specific tactics, techniques, and procedures (TTPs) for different sectors

Because it is easier to understand

Because it is more entertaining

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT typically a focus of threat intelligence analysis?

Extracting information from multiple sources

Synthesizing information

Summarizing information

Designing new hardware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is considered actionable information in threat intelligence analysis?

Malicious file signatures

Company financial reports

Employee satisfaction surveys

Weather forecasts

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a malicious URL?

A website that provides free educational resources

A uniform resource locator that is used to deliver malware or conduct phishing attacks

A link to a government website

A URL that leads to a social media page

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of a cyber defender in relation to CTI?

To create new viruses

To proactively block attacks using threat intelligence

To design video games

To write novels

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?