Product Dissemination Flashcards

1
Q

What is the main objective of cyber threat intelligence sharing initiatives?

A

To facilitate the sharing of threat data between organisations

To provide a centralised repository for threat data

To standardise the format of threat data shared between organisations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the importance of cyber threat intelligence sharing initiatives in improving national security?

A

It enables government agencies to pool resources and build a collective defence against cyber threats

It provides government agencies with central repositories of threat data to aid in their threat detection and response efforts

It enables sharing of data between government agencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How is the stix language structured?

A

As a collection of XML documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the relationship between taxii and stix?

A

Taxii provides a way of exchanging stix formatted threat intelligence information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of format should the cyber threat intelligence product be disseminated in?

A

Text based format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of stix?

A

To provide a commmon language for sharing and comparing threat intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does stix use to describe various aspects of a threat?

A

Standardises vocabularies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does stix use to describe various aspects of a threat?

A

Standardised vocabularies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What data exchange patterns does taxii support?

A

Request-response, subscription and push-based models

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the main advantage of using stix and taxii for sharing threat intelligence?

A

Increased speed and efficiency in sharing threat information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the primary goal of ISAC?

A

To improve the security of a particular sector or industry by facilitating the exchange of information about cyber threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a limitation of ISAC?

A

They may not have full participation from all organisations in a sector or industry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does a threat intelligence platform help organisations identify threats?

A

By comparing known threats against data collected from multiple sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can a threat intelligence platform help organisations mitigate threats?

A

By providing actionable intelligence that allows security teams to respond quickly and effectively

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is a benefit of using structured data in cyber threat intelligence?

A

It is easily shareable and machine readable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is an advantage of using structured data formats for cyber threat intelligence over unstructured formats?

A

Structured formats allow for easier analysis and correlation of data

17
Q

True or false: when reporting threat intelligence to customers it is important to include all the details and information even if it is not relevant to the customers specific environment?

A

False - only things relevant to their environment should be given

18
Q

T/f the purpose of reporting threat intelligence is to scare the customer into immediate action?

A

False

19
Q

T/f when reporting threat intelligence it is important to provide actionable recommendations for the customer to take

A

True

20
Q

Stix and taxii are only used by government organisations and agencies t/f

A

False

21
Q

Stix and taxii were developed to provide a standardised way of sharing threstnintelligence information formation and to reduce the duplication of effort in developing threat intelligence feeds

A

True

22
Q

Which of the following statements would be considered an explanation for TAXII?
- a standarised language for describing and exchanging information about cyber threats
- a tool for building effective cyber defenses
- a protocol that enables the secure and automated exchange of a stix formatted threat intelligence

A

A standardised language for describing and exchanging information about cyber threats

23
Q

What is the purpose of stix?

A

To provide a common language for sharing and comparing threat intelligence

24
Q

What is a threat intelligence platform?
- A platform that allows security professionals to share and collaborate on threat intelligence.
-A software application that provides information about the latest cyber threats

A

A platform that allows security professionals to share and collaborate threat intelligence

25
Q

What is the reason why structured CTI data is delivered through APIs?

A

APIs allow for real time delivery and automated processing

26
Q

Advantage of using structured data formats over unstructured data formats?

A

Structured formats allow for easier analysis and correlation of data