- Description
CYB 150 Wk 5 – Practice: Quiz
- Question 1
3/3
- Choose the correct order of steps to analyze the attack surface.
Hide answer choices
Identify the indicators of exposure-> Visualize the attack surface-> Simulate the attack-> Reduce the attack surface
Visualize the attack surface-> Simulate the attack-> Identify the indicators of exposure-> Reduce the attack surface
Visualize the attack surface-> Identify the indicators of exposure-> Simulate the attack-> Reduce the attack surface
Identify the indicators of exposure-> Simulate the attack-> Visualize the attack surface-> Reduce the attack surface
- Question 2
3/3
- Phishing-like attempts that present users a fake usage bill of the cloud provider is an example of:
Hide answer choices
User to service attack surface.
Cloud to service attack surface.
Cloud to user attack surface.
User to cloud attack surface.
- Question 3
3/3
- Which of these is an example of indicators of attack?
Hide answer choices
Malware
Signatures
Exploits
Remote code execution
- Question 4
3/3
- What is obtaining intelligence directly from attackers through the dark web and honeypots known as?
Hide answer choices
Human intelligence
Open-source intelligence
Internal intelligence
Counterintelligence
- Question 5
3/3
- Which of the following refers to the clues, artifacts, or evidence that indicate a potential intrusion or malicious activity in an organization’s infrastructure?
Hide answer choices
Indicators of exposure
Indicators of compromise
Key risk indicators
Indicators of attack
- Question 6
3/3
- Which of the following types of threat intelligence provides information related to an attacker’s TTPs used to perform an attack?
Hide answer choices
Dynamic threat intelligence
Operational threat intelligence
Tactical threat intelligence
Strategic threat intelligence
- Question 7
3/3
- Which of the following types of threat intelligence is mainly collected from sources such as campaign reports, malware, incident reports, attack group reports, and human intelligence?
Hide answer choices
Operational threat intelligence
Tactical threat intelligence
Dynamic threat intelligence
Strategic threat intelligence
- Question 8
3/3
- Which of the following types of threat intelligence provides information about specific threats against an organization?
Hide answer choices
Operational threat intelligence
Dynamic threat intelligence
Tactical threat intelligence
Strategic threat intelligence
- Question 9
3/3
- Which of the following types of threat intelligence is specifically collected from sources such as humans, social media, and chat rooms?
Hide answer choices
Dynamic threat intelligence
Tactical threat intelligence
Operational threat intelligence
Strategic threat intelligence
- Question 10
3/3
- Which of the following types of threat intelligence helps the incident response (IR) head, and the forensics team in deploying security assets to identify and stop upcoming attacks, improving the capability of detecting attacks at an early stage, and reducing their damage to IT assets?
Hide answer choices
Operational threat intelligence
Dynamic threat intelligence
Strategic threat intelligence
Tactical threat intelligence