PUR301 Final Revision

PUR301 Final Revision

University

18 Qs

quiz-placeholder

Similar activities

Message Authentication Code

Message Authentication Code

University

13 Qs

Python Revision

Python Revision

University

14 Qs

QUIZ KEMANAN JARINGAN

QUIZ KEMANAN JARINGAN

University

20 Qs

INFOE 4 Chapter 5 quiz

INFOE 4 Chapter 5 quiz

University

15 Qs

Parts of a Method (Java)

Parts of a Method (Java)

9th Grade - University

16 Qs

Machine Learning Techniques

Machine Learning Techniques

University

15 Qs

CPE2304 Quiz#5

CPE2304 Quiz#5

University

20 Qs

Chapter 5

Chapter 5

University

20 Qs

PUR301 Final Revision

PUR301 Final Revision

Assessment

Quiz

Computers

University

Hard

Created by

James Anderson

Used 6+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Red Teams use the MITRE ATT&CK Framework to simulate adversaries based on:

Imaginary tactics and techniques

Fictitious tactics and techniques

Made up tactics and techniques

Real-World tactics and techniques

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a purple team engagement, the red team______________.

Use use imaginative made-up tactics from imaginary adversaries.

Performs tasks that emulate real-world adversary attacks.

Monitor for real-word simulated attacks.

Perform pen testing of the target system.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The goal of precision is to have less of these.

True Negatives

False Negatives

True Positives

False Positives

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In purple team exercises, the blue team _______________.

Pretends to be a real life SOC team to catch fictitious attacks.

Acts as a real-life adversary using TTPs for attack.

Assists the red team in monitoring their pen testing

Evaluates and improves the organization's detection capabilities

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Optimizing precision means _____________.

Reducing false alarms

Keeping the signal to noise ratio down

Detecting false alarms

maximizing alert frequency

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Hiding malicious software within system files is a technique under what tactic?

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The term used to measure the percentage of true threats correctly identified in detection engineering.

precision

signature based detective

recall

allow list

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?