PUR301 Final Revision

PUR301 Final Revision

University

18 Qs

quiz-placeholder

Similar activities

Exploring Data Representation and Outliers

Exploring Data Representation and Outliers

University

15 Qs

Data Mining - Classification Mining

Data Mining - Classification Mining

University

15 Qs

Microsoft Word Chapter 1

Microsoft Word Chapter 1

KG - University

15 Qs

Intro to InfoTech_Part 1

Intro to InfoTech_Part 1

University

15 Qs

IAS Quiz 1

IAS Quiz 1

University

16 Qs

Programming concepts in c - Quizizz-III

Programming concepts in c - Quizizz-III

University

20 Qs

Unstop QNA

Unstop QNA

University

15 Qs

Cybersecurity Terminology Quiz Part 1

Cybersecurity Terminology Quiz Part 1

University

15 Qs

PUR301 Final Revision

PUR301 Final Revision

Assessment

Quiz

Computers

University

Hard

Created by

James Anderson

Used 6+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Red Teams use the MITRE ATT&CK Framework to simulate adversaries based on:

Imaginary tactics and techniques

Fictitious tactics and techniques

Made up tactics and techniques

Real-World tactics and techniques

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a purple team engagement, the red team______________.

Use use imaginative made-up tactics from imaginary adversaries.

Performs tasks that emulate real-world adversary attacks.

Monitor for real-word simulated attacks.

Perform pen testing of the target system.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The goal of precision is to have less of these.

True Negatives

False Negatives

True Positives

False Positives

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In purple team exercises, the blue team _______________.

Pretends to be a real life SOC team to catch fictitious attacks.

Acts as a real-life adversary using TTPs for attack.

Assists the red team in monitoring their pen testing

Evaluates and improves the organization's detection capabilities

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Optimizing precision means _____________.

Reducing false alarms

Keeping the signal to noise ratio down

Detecting false alarms

maximizing alert frequency

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Hiding malicious software within system files is a technique under what tactic?

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The term used to measure the percentage of true threats correctly identified in detection engineering.

precision

signature based detective

recall

allow list

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?