1.3 Threat Intelligence Flashcards
What is the basic principle underlying threat hunting activities?
- Fail-Safe
- Default Deny
- Assumption of Compromise
- Least Privilege
Assumption of Compromise
What security technology best assists with the automation of security workflows?
- SOAR
- IPS
- SIEM
- CASB
SOAR
What approach to threat identification begins with a listing of all resources owned by the organization?
- Likelihood-focused
- Threat-focused
- Asset-focused
- Service-focused
Asset-focused
The analysis of adversary TTP includes tools, techniques, and policies.
- TRUE
- FALSE
FALSE
What type of organization facilitates cybersecurity information sharing among a industry-specific communities?
- CIRT
- CERT
- InfraGard
- ISAC
ISAC
Which of the following is a standardized language used to communicate security information between systems and organizations
- CybOX
- TAXII
- STIX
- CVSS
STIX
Which one of the following is not an example of an open source intelligence resource?
- IP Reputation Service
- Social media
- Security website
- Government Security Analysis Center
IP Reputation Service