
Chapter 4: Threat Intelligence
Authored by Adrian Velazquez
Information Technology (IT)
Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following measures is not commonly used to assess threat intelligence?
Timeliness
Detail
Accuracy
Relevance
Answer explanation
While higher levels of detail can be useful, it isn't a common measure used to assess threat intelligence. Instead, the timeliness, accuracy, and relevance of the information are considered critical to determining whether you should use the threat information.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Nandita has encountered an attacker who appears to be using a commonly available exploit package to attack her organization. The package seems to have been run with default configurations against her entire public-facing Internet presence from a single system. What type of threat actor is she most likely facing?
An APT
A hacktivist
A script kiddie
A nation-state actor
Answer explanation
The lack of complexity and nuance most likely indicates that she has discovered an attack by an unskilled attacker, sometimes called a “script kiddie”.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following activities follows threat data analysis in the threat intelligence cycle?
Gathering feedback
Threat data collection
Threat data review
Threat intelligence dissemination
Answer explanation
Threat intelligence dissemination or sharing typically follows threat data analysis. The goal is to get the threat data into the hands of the organizations and individuals who need it.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Susan wants to start performing intelligence gathering. Which of the following options is frequently conducted in the requirements gathering stage?
Review of security breaches or compromises your organization has faced
Review of current vulnerability scans
Review of current data handling standards
Review of threat intelligence feeds for new threats
Answer explanation
Understanding what your organization needs is important for the requirements gathering phase of the intelligence cycle. Reviewing recent breaches and compromises can help to define what threats you are currently facing. Current vulnerability scans can identify where you may be vulnerable but are less useful for threat identification. Data handling standards do not provide threat information, and intelligence feed reviews list new threats, but those are useful only if you know what type of threats you're likely to face so that you can determine which ones you should target.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What organizations did the U.S. government help create to help share knowledge between organizations in specific verticals?
DHS
SANS
CERTs
ISACs
Answer explanation
The U.S. government created the information sharing and analysis centers (ISACs). ISACs help infrastructure owners and operators share threat information, as well as provide tools and assistance to their members.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following threat actors typically has the greatest access to resources?
Nation-state actors
Organized crime
Hacktivists
Insider threats
Answer explanation
Nation-state actors are government sponsored and typically have the greatest access to resources, including tools, money, and talent.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Organizations like Anonymous, which target governments and businesses for political reasons, are examples of what type of threat actor?
Hacktivists
Military assets
Nation-state actors
Organized crime
Answer explanation
Hacktivists execute attacks for political reasons, including those against governments and businesses. The key element in this question is the political reasons behind the attack.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?