1.3 Threat Intelligence Flashcards

1
Q

What is the basic principle underlying threat hunting activities?

  • Fail-Safe
  • Default Deny
  • Assumption of Compromise
  • Least Privilege
A

Assumption of Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What security technology best assists with the automation of security workflows?

  • SOAR
  • IPS
  • SIEM
  • CASB
A

SOAR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What approach to threat identification begins with a listing of all resources owned by the organization?

  • Likelihood-focused
  • Threat-focused
  • Asset-focused
  • Service-focused
A

Asset-focused

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The analysis of adversary TTP includes tools, techniques, and policies.

  • TRUE
  • FALSE
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of organization facilitates cybersecurity information sharing among a industry-specific communities?

  • CIRT
  • CERT
  • InfraGard
  • ISAC
A

ISAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is a standardized language used to communicate security information between systems and organizations

  • CybOX
  • TAXII
  • STIX
  • CVSS
A

STIX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which one of the following is not an example of an open source intelligence resource?

  • IP Reputation Service
  • Social media
  • Security website
  • Government Security Analysis Center
A

IP Reputation Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly