Data Analysis Flashcards
What is analysis of competing hypothesis?
- a psychological evaluation tool
- a scientific experiment design
- a structured decision making process
- a statistical analysis method
A structured decision making process
Which of the following is NOT a common data analysis technique?
- data normalisation
- encryption
- clustering
- regression
Encryption
What is an example of a political factor that could be evaluated in PESTLE analysis?
- changes in consumer behaviour
- fluctuations in exchange rates
- changes in government regulations
- advances in technology
Changes in government regulations
Why is it important to develop hypothesis about attack in cyber threat intelligence analysis?
- it helps in determining the course of attack
- it helps in collecting evidence
- it helps in identifying threat actors
- it helps in developing mitigation and response strategies
it helps in developing mitigation and response strategies
What is the best way to deal with deliberate misdirection in cyber threat intelligence analysis?
- verify information through multiple sources to ensure accuracy
- call out misdirection and demand accurate information
- use misdirection yourself to throw off potential attackers
- ignore the misdirection and move on to other leads
verify information through multiple sources to ensure accuracy
How does PESTLE compliment SWOT analysis?
-by detailed analysis of companies strengths and weaknesses
- by evaluating customer satisfaction and loyalty
- by identifying external factors that could impact a companies opportunities and threats
- comprehensive analysis of a companies performance
by identifying external factors that could impact a companies opportunities and threats
What are psychological operations?
- intentional efforts to disseminate false information
- tactics used to manipulate individuals behaviour and thinking
- none of these are correct
- physical actions intended to intimidate and coerce
tactics used to manipulate individuals behaviour and thinking
Structured brainstorming is part of hypothesis generation true or false
True
What is data visualisation?
The process of presenting data in a visual format
What is data fusion?
The process of analysing data from multiple sources to produce a single integrated view
What is the purpose of blind spot analysis?
To understand where it may be vulnerable to attack
What is the primary objective of the challenge analysis stage if the intelligence cycle?
To challenge assumptions and biases in the analysis phase
Why is it important to develop hypotheses about the attack in cyber threat intelligence analysis
It helps in determining the cause of the attack
The cone of plausibility has only been useful for developing hypothesis about nation state actors true or false
False the cone of plausibility applies to all threat actors
Structured brainstorming is part of hypothesis generation t/f
True
How can analysts reduce the risk of cognitive biases when using the ACH process?
By avoiding the use of subjective judgements
What is the purpose of combining pestle and swot analysis?
To identify both internal and external factors that could impact a company
Best way to respond to a straw man argument?
By pointing out the misrepresentation and refuting it.
What is the difference between a straw man argument and a valid counter argument?
A valid counter argument addresses the opponents actual position while a straw man argument misrepresents it
What is the deliberate misdirection in the context of CTI analysis?
-misleading analysts with false leads and red herrings
- all of these are correct
- purposely withholding key information from analysts
- intentionally providing incorrect or misleading information to analysts
All of these are correct
Common techniques in psychological operations to disseminate deliberate misinformation?
-social media manipulation and fake news dissemination
-all of these correct
- disinformation campaigns and false flag operations
- covert messaging and propaganda
All of these are correct
What is the purpose of inference in analysis?
To make predictions about future events based on past data
Why is it important in developing hypotheses about the attack in CTI?
-it helps in developing effective mitigation and response strategies
- it helps in determining the cause of the attack
- it helps in identifying the threat actors
- it helps in collecting evidence
It helps in identifying threat actors
Why do cyber threat actors use deliberate misdirection?
-all of these are correct
- to avoid detection and continue their activities
-to gain intelligence on analysts and their methods
- to mislead analysts and throw them off track
To avoid detection and continue their activities