Data Collection Data Sources Only Flashcards

1
Q

1)List five Data Collection methods

A
OSINT
HUMINT
CCI
IOCs
Malware analysis
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

2)List 6 OSINT methods of data collection

A
Search engines
Web Services
Web foot printing
Emails
Whois lookup
Data interrogation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3)List 3 techniques to collect data through HUMINT

A

Human-Based Social Engineering Techniques
Interviewing and Interrogation
Social Engineering Tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

4)List 5 techniques used to collect data from CCI

A
Honeypots
Passive DNS Monitoring
Pivoting Off Adversary’s Infrastructure
Malware Sinkholes
YARA Rules
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

5)Type of IOCs

A

External

Internal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

6)Malware Analysis

A

Preparing Testbed for Malware Analysis
Static Malware Analysis
Dynamic Malware Analysis
Malware Analysis Tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

7)List the techniques used in search engines

A

Advanced Google Search
Google Hacking Database
ThreatCrowd
Deep and Dark Web Searching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

8)List techniques used in Web Services

A
Finding Top-Level Domains (TLDs) and Sub-domains
Job Sites
Groups, Forums, and Blogs
Social Networking Sites
Blacklisted and Whitelisted Sites
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

9)List techniques used in web footprinting

A

Monitoring Website Traffic
Website Mirroring
https://archive.org
Extracting Metadata of Public Documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

10)List techniques used in emails

A

Tracking Email Communications
Email Header
eMailTrackerPro

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

11)List techniques used in DNS interrogation

A

DNS Lookup and Reverse DNS Lookup
Fast-Flux DNS Information Gathering
Dynamic DNS (DDNS) Information Gathering
DNS Zone Transfer Information Gathering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

12)List OSINT tools frameworks and scripts

A
Maltego
OSTrICa
OSRFramework
FOCA
GOSINT
Others
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

13)Explain Human-Based Social Engineering Techniques

A

TBD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

14)Explain Interviewing and Interrogation

A

TBD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

15)Explain Social Engineering Tools

A

TBD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

16)Explain honeypots

A

TBD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

17)Explain passive DNS monitoring

A

TBD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

18)Explain Pivoting off adversaries infrastructure

A

TBD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

19)Explain Malware sinkholes

A

TBD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

20)Explain Yara rules

A

TBD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

21)List external IOC collection tools

A
IT-ISAC
AlienVault OTX
Blueliv Threat Exchange Network
MISP
threat_note
Cacador
IOC Bucket
Others
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

22)List internal IOC tools

A

Splunk Enterprise
Valkyrie
IOC Finder
Redline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

23)Explain Building custom IOC tools

A

TBD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

24)What are the Steps for Effective

Usage of Indicators of Compromise for Threat Intelligence

A

TBD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

25)Advanced Google Search

A

TBD

26
Q

26)Google Hacking Database

A

TBD

27
Q

27)ThreatCrowd

A

TBD

28
Q

28)Deep and Dark Web Searching

A

TBD

29
Q

29)Finding Top-Level Domains (TLDs) and Sub-domains

A

TBD

30
Q

30)Job Sites

A

TBD

31
Q

31)Groups, Forums, and Blogs

A

TBD

32
Q

32)Social Networking Sites

A

TBD

33
Q

33)Blacklisted and Whitelisted Sites

A

TBD

34
Q

34)Monitoring Website Traffic

A

TBD

35
Q

35)Website Mirroring

A

TBD

36
Q

36)https://archive.org

A

TBD

37
Q

37)Extracting Metadata of Public Documents

A

TBD

38
Q

38)Tracking Email Communications

A

TBD

39
Q

39)Email Header

A

TBD

40
Q

40)eMailTrackerPro

A

TBD

41
Q

41)Who is Lookup

A

TBD

42
Q

42)DNS Lookup and Reverse DNS Lookup

A

TBD

43
Q

43)Fast-Flux DNS Information Gathering

A

TBD

44
Q

44)Dynamic DNS (DDNS) Information Gathering

A

TBD

45
Q

45)DNS Zone Transfer Information Gathering

A

TBD

46
Q

46)Maltego

A

TBD

47
Q

47)OSTrICa

A

TBD

48
Q

48)OSRFramework

A

TBD

49
Q

49)FOCA

A

TBD

50
Q

50)GOSINT

A

TBD

51
Q

51)IT-ISAC

A

TBD

52
Q

52)AlienVault OTX

A

TBD

53
Q

53)Blueliv Threat Exchange Network

A

TBD

54
Q

54)MISP

A

TBD

55
Q

55)threat_note

A

TBD

56
Q

56)Cacador

A

TBD

57
Q

57)IOC Bucket

A

TBD

58
Q

58)Splunk Enterprise

A

TBD

59
Q

59)Valkyrie

A

TBD

60
Q

60)IOC Finder

A

TBD

61
Q

61)Redline

A

TBD