Data Analysis Flashcards

1
Q

What is analysis of competing hypothesis?
- a psychological evaluation tool
- a scientific experiment design
- a structured decision making process
- a statistical analysis method

A

A structured decision making process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is NOT a common data analysis technique?
- data normalisation
- encryption
- clustering
- regression

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an example of a political factor that could be evaluated in PESTLE analysis?
- changes in consumer behaviour
- fluctuations in exchange rates
- changes in government regulations
- advances in technology

A

Changes in government regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why is it important to develop hypothesis about attack in cyber threat intelligence analysis?
- it helps in determining the course of attack
- it helps in collecting evidence
- it helps in identifying threat actors
- it helps in developing mitigation and response strategies

A

it helps in developing mitigation and response strategies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the best way to deal with deliberate misdirection in cyber threat intelligence analysis?
- verify information through multiple sources to ensure accuracy
- call out misdirection and demand accurate information
- use misdirection yourself to throw off potential attackers
- ignore the misdirection and move on to other leads

A

verify information through multiple sources to ensure accuracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does PESTLE compliment SWOT analysis?
-by detailed analysis of companies strengths and weaknesses
- by evaluating customer satisfaction and loyalty
- by identifying external factors that could impact a companies opportunities and threats
- comprehensive analysis of a companies performance

A

by identifying external factors that could impact a companies opportunities and threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are psychological operations?
- intentional efforts to disseminate false information
- tactics used to manipulate individuals behaviour and thinking
- none of these are correct
- physical actions intended to intimidate and coerce

A

tactics used to manipulate individuals behaviour and thinking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Structured brainstorming is part of hypothesis generation true or false

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is data visualisation?

A

The process of presenting data in a visual format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is data fusion?

A

The process of analysing data from multiple sources to produce a single integrated view

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of blind spot analysis?

A

To understand where it may be vulnerable to attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the primary objective of the challenge analysis stage if the intelligence cycle?

A

To challenge assumptions and biases in the analysis phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why is it important to develop hypotheses about the attack in cyber threat intelligence analysis

A

It helps in determining the cause of the attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The cone of plausibility has only been useful for developing hypothesis about nation state actors true or false

A

False the cone of plausibility applies to all threat actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Structured brainstorming is part of hypothesis generation t/f

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can analysts reduce the risk of cognitive biases when using the ACH process?

A

By avoiding the use of subjective judgements

17
Q

What is the purpose of combining pestle and swot analysis?

A

To identify both internal and external factors that could impact a company

18
Q

Best way to respond to a straw man argument?

A

By pointing out the misrepresentation and refuting it.

19
Q

What is the difference between a straw man argument and a valid counter argument?

A

A valid counter argument addresses the opponents actual position while a straw man argument misrepresents it

20
Q

What is the deliberate misdirection in the context of CTI analysis?
-misleading analysts with false leads and red herrings
- all of these are correct
- purposely withholding key information from analysts
- intentionally providing incorrect or misleading information to analysts

A

All of these are correct

21
Q

Common techniques in psychological operations to disseminate deliberate misinformation?
-social media manipulation and fake news dissemination
-all of these correct
- disinformation campaigns and false flag operations
- covert messaging and propaganda

A

All of these are correct

22
Q

What is the purpose of inference in analysis?

A

To make predictions about future events based on past data

23
Q

Why is it important in developing hypotheses about the attack in CTI?
-it helps in developing effective mitigation and response strategies
- it helps in determining the cause of the attack
- it helps in identifying the threat actors
- it helps in collecting evidence

A

It helps in identifying threat actors

24
Q

Why do cyber threat actors use deliberate misdirection?
-all of these are correct
- to avoid detection and continue their activities
-to gain intelligence on analysts and their methods
- to mislead analysts and throw them off track

A

To avoid detection and continue their activities