IT Preparation

IT Preparation

Professional Development

63 Qs

quiz-placeholder

Similar activities

AZ-900 Assessment

AZ-900 Assessment

Professional Development

60 Qs

Conceptos Clave de Marketing Profe Diego

Conceptos Clave de Marketing Profe Diego

Professional Development

64 Qs

Professional Scrum Developer bài 5 - 2024 Dec 12 - 60 câu

Professional Scrum Developer bài 5 - 2024 Dec 12 - 60 câu

Professional Development

60 Qs

 PPPK TIK TEKNIS PART 1

PPPK TIK TEKNIS PART 1

Professional Development

65 Qs

Đề 2

Đề 2

Professional Development

60 Qs

CONTENIDOS

CONTENIDOS

Professional Development

59 Qs

IT Preparation

IT Preparation

Assessment

Quiz

Information Technology (IT)

Professional Development

Practice Problem

Medium

Created by

Budi Raharjo

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

63 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Daniel is a professional hacker whose aim is to attack a system to steal data and money for profit. He performs hacking to obtain confidential data such as social security numbers, personally identifiable information (PII) of an employee, and credit card information. After obtaining confidential data, he further sells the information on the black market to make money.
Daniel comes under which of the following types of threat actor.

Industrial spies

State-sponsored hackers

Insider threat

Organized hackers

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An attacker instructs bots to use camouflage mechanism to hide his phishing and malware delivery locations in the rapidly changing network of compromised bots. In this particular technique, a single domain name consists of multiple IP addresses.
Which of the following technique is used by the attacker?

DNS zone transfer

Dynamic DNS

DNS interrogation

Fast-Flux DNS

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Kathy wants to ensure that she shares threat intelligence containing sensitive information with the appropriate audience. Hence, she used traffic light protocol (TLP).
Which TLP color would you signify that information should be shared only within a particular community?

White

Green

Amber

Red

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Moses, a threat intelligence analyst at InfoTec Inc., wants to find crucial information about the potential threats the organization is facing by using advanced Google search operators. He wants to identify whether any fake websites are hosted at the similar to the organization’s URL.
Which of the following Google search queries should Moses use?

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A team of threat intelligence analysts is performing threat analysis on malware, and each of them has come up with their own theory and evidence to support their theory on a given malware.
Now, to identify the most consistent theory out of all the theories, which of the following analytic processes must threat intelligence manager use?

Threat modelling

Application decomposition and analysis (ADA)

Analysis of competing hypotheses (ACH)

Automated technical analysis

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Miley, an analyst, wants to reduce the amount of collected data and make the storing and sharing process easy. She uses filtering, tagging, and queuing technique to sort out the relevant and structured data from the large amounts of unstructured data.
Which of the following techniques was employed by Miley?

Sandboxing

Normalization

Data visualization

Convenience sampling

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Bob, a threat analyst, works in an organization named TechTop. He was asked to collect intelligence to fulfil the needs and requirements of the Red Tam present within the organization.
Which of the following are the needs of a RedTeam?

Intelligence related to increased attacks targeting a particular software or operating system vulnerability

Intelligence on latest vulnerabilities, threat actors, and their tactics, techniques, and procedures (TTPs)

Intelligence extracted latest attacks analysis on similar organizations, which includes details about latest threats and TTPs

Intelligence that reveals risks related to various strategic business decisions

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Information Technology (IT)