Data Collection Flashcards

1
Q

What can it indicate if a domain is registered to an anonymous or fictitious entity?
-it could be an indicator of malicious intent
- it is impossible to determine without further investigation
- it is likely a legitimate domain

A

It could be an indicator of malicious intent (distributing malware)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data collection involves the systematic gathering of information from different sources true or false

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which type of data is typically collected in CTI?
Personal, financial, sales reports or threat actor behaviours

A

Threat actor behaviours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is virustotal?

A

A website that scans urls and files for malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is th e purpose of virus totals url scanner?

A

To identify malicious urls that distribute malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of pivoting in the diamond model?

A

To shift focus from an indicator to the attacker or an already recognised campaign

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is a common method to collect cyber threat intelligence?
Brute force attack, denial of service, social engineering or passive network monitoring

A

Passive network monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Metadata can be used to determine the security classification of a document true or false

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Document metadata cannot be modified or falsified true or false

A

False it can be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of an intelligence collection plan?

A

To prioritise and focus intelligence collection efforts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an example of a collection requirement?

A

To identify threat actors targeting a specific industry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What types of metadata are used in CTI?
- all of these are correct
- threat actor attributes and motivations
-ip addresses, domain names, and file hashes
- vulnerability information and exploit techniques

A

All of these

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the diamond model show in relation to an attack?

A

The infrastructure used by an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the ultimate goal in using the diamond model in cyber threat analysis
- to evaluate the security posture of the organisation
-to gather network logs and system admin logs
- to identify and evaluate vulnerabilities
- to develop effective mitigation and response strategies

A

To develop effective mitigation and response strategies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

I high of the following file types can be analysed by virustotal?
Exe, doc, pdf or all correct

A

All correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Metadata can be used to classify the security of a document true or false

A

True it can be

17
Q
A
18
Q

What is metadata

A

Data about data

19
Q

What is the cyber threat landscape

A

The digital environment in which cyber threats exist

20
Q

What’s virustotal

A

A website that analyses files and URLs for malware

21
Q

What is the purpose of virustotals url scanner?

A

To identify malicious URLs that distribute malware

22
Q

Document metadata cannot be modified or falsified t/f

A

False it can be