Arcx Flashcards

1
Q

What part of the F3ead cycle is associated with who what where and why?

A

Find

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a common technique used by nation state actors to conduct reconnaissance on a target?
-network mapping
-ddos attacks
-social engineering
-none of these are correct
-Ransomware

A

Network mapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is a key challenge in managing over human intelligence sources?
-ensuring their personal safety and well being
- all of these are correct
-providing them with adequate compensation
- ensuring their compliance with ethical standards
-maintaining accurate records of their activities

A

Ensuring their compliance with ethical standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a diagnostic in the ACH process?
-a piece of evidence that supports or refutes a hypothesis
- a tool for analysing data
-a technique for collecting data
-a measure of the impact of a hypothesis
- a measure of the strength of a hypothesis

A

a piece of evidence that supports or refutes a hypothesis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of the ACH matrix?
-to evaluate the probability of each hypothesis being correct
-to organise evidence for each hypothesis in a systematic way.
- none of these are correct
- to compare the strengths and weaknesses of each hypothesis
- to prioritise hypotheses for further investigation

A

To compare the strengths and weaknesses of each hypothesis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of a CTI feed in the context of CTI?
- to automatically respond to cyber threats in realtime
- to provide a real time stream of CTI to subscribers
- to prioritise vulnerabilities in a network based on their impact
- to provide a comprehensive database of CTI
- to analyse network traffic and detect potential cyber threats

A

to provide a real time stream of CTI to subscribers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Can the mitre attack be used for red teaming exercises?
- yes only under certain conditions
-yes but only with additional tools and resources
- no it is only used for defensive context
-yes it can be used to simulate the threat tactics and techniques of threat actors

A

yes it can be used to simulate the threat tactics and techniques of threat actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the goal of command and control stage of the cyber killchain?
-to establish a secure connection to the target system
-to control the compromised system remotely
- to evade detection by security tools
- to launch a destructive attack
- to steal sensitive information

A

To control the compromised system remotely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the structure of a BLUF report?
-the conclusion or main message is presented first, followed by supporting information
-the report is presented in reverse chronological order from end to beginning
-the supporting information is presented first followed by the conclusion or main message
-the report is presented in chronological order
- none of these are correct

A

the conclusion or main message is presented first, followed by supporting information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What do we mean by the acronym RFI?

A

The process includes any specific time-sensitive ad hoc requirement for intelligence information or products to support an ongoing event or incident not necessarily related to standing requirements or scheduled intelligence production.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which country was implicated in APT1 attacks?

A

China

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is generally considered as an intelligence requirement?

A

Those intelligence requirements for which a commander has an anticipated and stated priority in his task of planning and decision making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What layer of the OSI model is responsible for routing and forwarding of data packets between network devices?

A

Network layer layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the primary purpose of an API?
- to provide and graphical user interface GUI for an application
-to provide a way for users to store files in the cloud
- to provide a way for users to download software updates
To provide a way for different software applications to communicate with eacother
- to provide a way for users to interact with a database

A

To provide a way for different software applications to communicate with eacother

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of the TOR document’s deliverables section?
- to list the project outputs
To assign project roles and responsibilities
- to identify the project sponsor
-to describe the project scope
- to outline the project objectives

A

To list the project outputs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly