Cybersecurity Threat Intelligence Quiz
50 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

A campaign is a collection of malicious actor behaviors targeting a common ______ over a finite timeframe.

target

A course of action is a preventative or response action to address an ______.

attack

An Identity is an SDO representing individuals, organizations, or ______.

groups

Indicators in spear phishing messages often use links with phishing ______, generic form language, or ASCII homographs.

<p>domains</p> Signup and view all the answers

An intrusion set may comprise multiple campaigns over a long period, even if from the same threat ______.

<p>actor</p> Signup and view all the answers

TAXII defines how threat data is shared among participating ______.

<p>partners</p> Signup and view all the answers

TAXII specifies the structure for exchanging information and accompanying ______.

<p>messages</p> Signup and view all the answers

TAXII 1.0 integrates with existing sharing agreements using three primary ______.

<p>models</p> Signup and view all the answers

In the Hub and Spoke model, a central Hub communicates with multiple ______ nodes.

<p>Spoke</p> Signup and view all the answers

In the Peer-to-Peer model, peers communicate ______ with each other.

<p>directly</p> Signup and view all the answers

Accuracy is crucial for decision-making in information __________.

<p>security</p> Signup and view all the answers

Analysts should acknowledge and mitigate __________ by surrounding themselves with diverse perspectives.

<p>bias</p> Signup and view all the answers

The __________ level of confidence is used for assessments based on high-quality information.

<p>high</p> Signup and view all the answers

Moderate confidence indicates that the information is credibly sourced but not sufficient for a higher level of __________.

<p>confidence</p> Signup and view all the answers

Information categorized as __________ is questionable, fragmented, and raises significant concerns about its sources.

<p>low</p> Signup and view all the answers

Malware is any malicious code or software used to compromise the integrity or availability of a system or its ______.

<p>data</p> Signup and view all the answers

The observed data SDO describes any observable collected from a network or ______ device.

<p>system</p> Signup and view all the answers

Reports detail security events, including the malware used or the methodologies employed during a ______.

<p>campaign</p> Signup and view all the answers

The threat actor SDO identifies individuals or groups responsible for ______ activities.

<p>malicious</p> Signup and view all the answers

The tool SDO describes software used by threat actors during ______.

<p>campaigns</p> Signup and view all the answers

An indicator includes context describing an aspect of an event relating to a specific ______.

<p>intrusion</p> Signup and view all the answers

To transform newly discovered indicators into actionable items, analysts perform ______ to determine if the indicator is valid.

<p>vetting</p> Signup and view all the answers

The Structured Threat Information Expression (STIX) uses a structure based on twelve Domain Objects (SDOs) and two ______ Objects (SROs).

<p>Relationship</p> Signup and view all the answers

Attack patterns help categorize attacker tactics, techniques, and ______.

<p>procedures</p> Signup and view all the answers

Sharing threat intelligence with partners benefits everyone by improving detection and prioritizing ______ allocation.

<p>resource</p> Signup and view all the answers

A Vulnerability SDO is used to communicate any mistake in software that an attacker can exploit to gain unauthorized access to a _____

<p>system</p> Signup and view all the answers

Malware objects provide key characteristics about the malicious software and when they are used in an _____

<p>attack</p> Signup and view all the answers

The Relationship SRO links SDOs together and shows how they work with each _____

<p>other</p> Signup and view all the answers

A Sighting SRO provides information about the occurrence of an SDO, such as an indicator or _____

<p>malware</p> Signup and view all the answers

The relationship type 'target' is used to show the relationship between a source SDO and a target _____

<p>SDO</p> Signup and view all the answers

Signature-based systems are effective against ______ threats.

<p>known</p> Signup and view all the answers

Anomaly-based systems examine what an executable does, not just what it ______ like.

<p>looks</p> Signup and view all the answers

'Zero day' refers to a vulnerability or exploit in software that is previously ______ to the public.

<p>unknown</p> Signup and view all the answers

Anomaly-based systems often use a ______ environment to observe an executable's behavior.

<p>virtual</p> Signup and view all the answers

A zero-day vulnerability is a flaw in software that the ______ is unaware of.

<p>vendor</p> Signup and view all the answers

The TAXII server manages the ______ and channels.

<p>collections</p> Signup and view all the answers

OpenIOC is designed to organize information about attacker tactics, techniques, and procedures (TTPs) and indicators of ______.

<p>compromise</p> Signup and view all the answers

The ______ is the client that requests and subscribes to data in the TAXII 2.0 architecture.

<p>Consumer</p> Signup and view all the answers

OpenIOC comprises three main components: IOC Metadata, References, and ______.

<p>Definition</p> Signup and view all the answers

A ______ in OpenIOC describes how the IOC fits operationally within specific environments.

<p>Reference</p> Signup and view all the answers

APTs are identified by the use of stealthy and continuous computer hacking ______.

<p>techniques</p> Signup and view all the answers

APT operators often use both digital surveillance and traditional techniques targeting ______.

<p>humans</p> Signup and view all the answers

These campaigns are often orchestrated by military or government ______.

<p>entities</p> Signup and view all the answers

APTs reflect a political plan, indicating their nature as a deeper ______ issue.

<p>political</p> Signup and view all the answers

The execution of APT campaigns might be automated, but humans are responsible for their ______.

<p>orchestration</p> Signup and view all the answers

Zero-day vulnerabilities create black markets for these ______.

<p>exploits</p> Signup and view all the answers

Security teams need to develop ______ and controls to mitigate impacts from discoveries.

<p>mitigations</p> Signup and view all the answers

Organizations should use a multi-faceted approach to respond to ______ exploits.

<p>zero-day</p> Signup and view all the answers

The US Pentagon has adopted 'Hack the Pentagon' as part of a ______ program.

<p>bug bounty</p> Signup and view all the answers

Proactive efforts to discover new ______ are essential for organizations.

<p>threats</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser