Data Analysis IMG Flashcards

1
Q

Threat Analysis Process and Responsibilities

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat Analysis Based on Cyber Kill Chain Methodology

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Aligning the Defensive Strategies with the Phases of the Cyber Kill Chain Methodology

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Perform Threat Modeling

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threat Modeling Methodologies

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Diamond Model Framework

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Enrich the Indicators with Context

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Validating and Prioritizing Threat Indicators

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fine-Tuning Threat Analysis

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Identifying and Removing Noise

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Identifying and Removing Logical Fallacies

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Identifying and Removing Cognitive Biases

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Automate Threat Analysis Processe

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Employ Advanced Threat Analysis Techniques: Machine Learning-Based Threat Analysis

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Employ Advanced Threat Analysis Techniques: Cognitive-Based Threat Analysis

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Threat Intelligence Evaluation

A
17
Q

Threat Attribution

A
18
Q

Developing Runbooks

A
19
Q

Create an Accessible Threat Knowledge Base

A
20
Q
A