PUR301 Final Revision

PUR301 Final Revision

University

18 Qs

quiz-placeholder

Similar activities

Cyber EOP - Physical Security By Mr. B

Cyber EOP - Physical Security By Mr. B

12th Grade - University

20 Qs

Deep Learning quiz

Deep Learning quiz

University

20 Qs

Exploring Data Representation and Outliers

Exploring Data Representation and Outliers

University

15 Qs

Unstop QNA

Unstop QNA

University

15 Qs

Digital Signature Schemes

Digital Signature Schemes

University

15 Qs

Artificial Intelligence Appreciation Day Quiz

Artificial Intelligence Appreciation Day Quiz

University

20 Qs

Monster Tutorial

Monster Tutorial

University

18 Qs

TDC1231 Lec4 Quiz

TDC1231 Lec4 Quiz

KG - University

15 Qs

PUR301 Final Revision

PUR301 Final Revision

Assessment

Quiz

Computers

University

Hard

Created by

James Anderson

Used 6+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Red Teams use the MITRE ATT&CK Framework to simulate adversaries based on:

Imaginary tactics and techniques

Fictitious tactics and techniques

Made up tactics and techniques

Real-World tactics and techniques

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a purple team engagement, the red team______________.

Use use imaginative made-up tactics from imaginary adversaries.

Performs tasks that emulate real-world adversary attacks.

Monitor for real-word simulated attacks.

Perform pen testing of the target system.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The goal of precision is to have less of these.

True Negatives

False Negatives

True Positives

False Positives

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In purple team exercises, the blue team _______________.

Pretends to be a real life SOC team to catch fictitious attacks.

Acts as a real-life adversary using TTPs for attack.

Assists the red team in monitoring their pen testing

Evaluates and improves the organization's detection capabilities

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Optimizing precision means _____________.

Reducing false alarms

Keeping the signal to noise ratio down

Detecting false alarms

maximizing alert frequency

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Hiding malicious software within system files is a technique under what tactic?

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The term used to measure the percentage of true threats correctly identified in detection engineering.

precision

signature based detective

recall

allow list

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?