Data Collection Flashcards
What can it indicate if a domain is registered to an anonymous or fictitious entity?
-it could be an indicator of malicious intent
- it is impossible to determine without further investigation
- it is likely a legitimate domain
It could be an indicator of malicious intent (distributing malware)
Data collection involves the systematic gathering of information from different sources true or false
True
Which type of data is typically collected in CTI?
Personal, financial, sales reports or threat actor behaviours
Threat actor behaviours
What is virustotal?
A website that scans urls and files for malware
What is th e purpose of virus totals url scanner?
To identify malicious urls that distribute malware
What is the purpose of pivoting in the diamond model?
To shift focus from an indicator to the attacker or an already recognised campaign
Which of the following is a common method to collect cyber threat intelligence?
Brute force attack, denial of service, social engineering or passive network monitoring
Passive network monitoring
Metadata can be used to determine the security classification of a document true or false
True
Document metadata cannot be modified or falsified true or false
False it can be
What is the purpose of an intelligence collection plan?
To prioritise and focus intelligence collection efforts
What is an example of a collection requirement?
To identify threat actors targeting a specific industry
What types of metadata are used in CTI?
- all of these are correct
- threat actor attributes and motivations
-ip addresses, domain names, and file hashes
- vulnerability information and exploit techniques
All of these
What does the diamond model show in relation to an attack?
The infrastructure used by an attacker
What is the ultimate goal in using the diamond model in cyber threat analysis
- to evaluate the security posture of the organisation
-to gather network logs and system admin logs
- to identify and evaluate vulnerabilities
- to develop effective mitigation and response strategies
To develop effective mitigation and response strategies
I high of the following file types can be analysed by virustotal?
Exe, doc, pdf or all correct
All correct