CYB 150 Wk 5 – Practice: Quiz

0 items
CYB 150 Wk 5 - Practice: Quiz
CYB 150 Wk 5 – Practice: Quiz
$5.00
  • Description

CYB 150 Wk 5 – Practice: Quiz

  1. Question 1

3/3

  1. Choose the correct order of steps to analyze the attack surface.

Hide answer choices

Identify the indicators of exposure-> Visualize the attack surface-> Simulate the attack-> Reduce the attack surface

Visualize the attack surface-> Simulate the attack-> Identify the indicators of exposure-> Reduce the attack surface

Visualize the attack surface-> Identify the indicators of exposure-> Simulate the attack-> Reduce the attack surface

Identify the indicators of exposure-> Simulate the attack-> Visualize the attack surface-> Reduce the attack surface

  1. Question 2

3/3

  1. Phishing-like attempts that present users a fake usage bill of the cloud provider is an example of:

Hide answer choices

User to service attack surface.

Cloud to service attack surface.

Cloud to user attack surface.

User to cloud attack surface.

  1. Question 3

3/3

  1. Which of these is an example of indicators of attack?

Hide answer choices

Malware

Signatures

Exploits

Remote code execution

  1. Question 4

3/3

  1. What is obtaining intelligence directly from attackers through the dark web and honeypots known as?

Hide answer choices

Human intelligence

Open-source intelligence

Internal intelligence

Counterintelligence

  1. Question 5

3/3

  1. Which of the following refers to the clues, artifacts, or evidence that indicate a potential intrusion or malicious activity in an organization’s infrastructure?

Hide answer choices

Indicators of exposure

Indicators of compromise

Key risk indicators

Indicators of attack

  1. Question 6

3/3

  1. Which of the following types of threat intelligence provides information related to an attacker’s TTPs used to perform an attack?

Hide answer choices

Dynamic threat intelligence

Operational threat intelligence

Tactical threat intelligence

Strategic threat intelligence

  1. Question 7

3/3

  1. Which of the following types of threat intelligence is mainly collected from sources such as campaign reports, malware, incident reports, attack group reports, and human intelligence?

Hide answer choices

Operational threat intelligence

Tactical threat intelligence

Dynamic threat intelligence

Strategic threat intelligence

  1. Question 8

3/3

  1. Which of the following types of threat intelligence provides information about specific threats against an organization?

Hide answer choices

Operational threat intelligence

Dynamic threat intelligence

Tactical threat intelligence

Strategic threat intelligence

  1. Question 9

3/3

  1. Which of the following types of threat intelligence is specifically collected from sources such as humans, social media, and chat rooms?

Hide answer choices

Dynamic threat intelligence

Tactical threat intelligence

Operational threat intelligence

Strategic threat intelligence

  1. Question 10

3/3

  1. Which of the following types of threat intelligence helps the incident response (IR) head, and the forensics team in deploying security assets to identify and stop upcoming attacks, improving the capability of detecting attacks at an early stage, and reducing their damage to IT assets?

Hide answer choices

Operational threat intelligence

Dynamic threat intelligence

Strategic threat intelligence

Tactical threat intelligence