Management Flashcards

1
Q

How should words of estimative probability be used in the context of intelligence analysis?

A

As a relative guide to the level of confidence in a conclusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is ISO/IEC 27001:2013?

A

A standard for information security management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the role of senior management in implementing ISO/IEC 27001:2013?

A

To provide leadership and support for the implementation of and maintenance of the ISMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What kind of information may executives be more interested in?

A

High-level risks and potential impact on business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What should be included in a cyber threat intelligence report to help the audience understand the severity of the threat?

A

Context for the information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the difference between likelihood and impact in a structured risk scale?

A

Impact refers to the severity of the risk while likelihood refers to the probability of occurrence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can a structured risk scale be used to communicate risk to stakeholders?

A

By presenting a clear and concise report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the main difference between traditional penetration testing and threat led penetration testing?

A

Traditional testing focuses on exploiting known vulnerabilities while threat led testing incorporates the latest threat intelligence to identify emerging threats and attack techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some of the methods used by testers to gather intelligence during a threat led penetration test?

A

Analysing public facing websites and social media profiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the main goal of a threat led penetration test?

A

To simulate a real world attack and document potential attack scenarios

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following angles are typically considered during threat modelling?

A

Technical, procedural and human factors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Who within an organisation may not be interested in technical details in a cyber threat intelligence report?

A

Middle management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can tailoring cyber threat intelligence reports for the right audience enhance the overall security posture of an organisation?

A

By ensuring the intelligence is acted upon and resources are deployed efficiently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the benefit of providing clear recommendations in cyber threat intelligence reports?

A

Creating actionable intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

T/f a risk matrix is a tool used to prioritise risk based on their likelihood and impact

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

T/f cyber threat intelligence analysts do not need to worry about implementing key findings from their disseminated reports

A

True

17
Q

Threat modelling is a process of identifying potential threats and vulnerabilities that could harm an organisation t/f

A

True

18
Q

Threat modelling involves ranking potential threats by their severity and likelihood of occurrence t/f

A

True

19
Q

Organisations should only perform risk assessments when they have already experienced a security breach t/f

A

False

20
Q

Threat modelling is only relevant for organisations that have a high level of security risk t/f

A

False

21
Q

Why is tailoring your cyber threat reports important

A

To ensure that intelligence is acted upon

22
Q

What can the diamond model be used for in a cyber threat intelligence report?
- to provide additional resources
- to provide a standardised format

A

To provide a standardised format

23
Q

Which of the following factors should be considered when assigning values to risks in a structured scale?
- likelihood and impact of the risk
- location of the risk
- length of the report

A

Likelihood and impact of the risk

24
Q

What is the benefit of using a standardised risk scale?
- increases likelihood of cyber attacks
- makes it easier to assign values to risks
- enables comparison of risks across organisations

A

Enables comparison of risks across organisations

25
Q

What is the purpose of documenting findings during a threat led pen test?

A

To prioritise remediation efforts and improve overall security posture