Search Header Logo

Chapter 4: Threat Intelligence

Authored by Adrian Velazquez

Information Technology (IT)

Professional Development

Used 1+ times

Chapter 4: Threat Intelligence
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following measures is not commonly used to assess threat intelligence?

  1. Timeliness

  1. Detail

  1. Accuracy

  1. Relevance

Answer explanation

While higher levels of detail can be useful, it isn't a common measure used to assess threat intelligence. Instead, the timeliness, accuracy, and relevance of the information are considered critical to determining whether you should use the threat information.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Nandita has encountered an attacker who appears to be using a commonly available exploit package to attack her organization. The package seems to have been run with default configurations against her entire public-facing Internet presence from a single system. What type of threat actor is she most likely facing?

  1. An APT

  1. A hacktivist

  1. A script kiddie

  1. A nation-state actor

Answer explanation

The lack of complexity and nuance most likely indicates that she has discovered an attack by an unskilled attacker, sometimes called a “script kiddie”.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following activities follows threat data analysis in the threat intelligence cycle?

  1. Gathering feedback

  1. Threat data collection

  1. Threat data review

  1. Threat intelligence dissemination

Answer explanation

Threat intelligence dissemination or sharing typically follows threat data analysis. The goal is to get the threat data into the hands of the organizations and individuals who need it.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Susan wants to start performing intelligence gathering. Which of the following options is frequently conducted in the requirements gathering stage?

  1. Review of security breaches or compromises your organization has faced

  1. Review of current vulnerability scans

  1. Review of current data handling standards

  1. Review of threat intelligence feeds for new threats

Answer explanation

Understanding what your organization needs is important for the requirements gathering phase of the intelligence cycle. Reviewing recent breaches and compromises can help to define what threats you are currently facing. Current vulnerability scans can identify where you may be vulnerable but are less useful for threat identification. Data handling standards do not provide threat information, and intelligence feed reviews list new threats, but those are useful only if you know what type of threats you're likely to face so that you can determine which ones you should target.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What organizations did the U.S. government help create to help share knowledge between organizations in specific verticals?

  1. DHS

  1. SANS

  1. CERTs

  1. ISACs

Answer explanation

The U.S. government created the information sharing and analysis centers (ISACs). ISACs help infrastructure owners and operators share threat information, as well as provide tools and assistance to their members.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following threat actors typically has the greatest access to resources?

  1. Nation-state actors

  1. Organized crime

  1. Hacktivists

  1. Insider threats

Answer explanation

Nation-state actors are government sponsored and typically have the greatest access to resources, including tools, money, and talent.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Organizations like Anonymous, which target governments and businesses for political reasons, are examples of what type of threat actor?

  1. Hacktivists

  1. Military assets

  1. Nation-state actors

  1. Organized crime

Answer explanation

Hacktivists execute attacks for political reasons, including those against governments and businesses. The key element in this question is the political reasons behind the attack.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?